Canonical USN OVAL Generator
1
5.11.1
2025-06-12T11:10:27
Copyright (C) 2025 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/.
Check that Ubuntu 24.04 LTS (noble) is installed.
USN-6663-3 -- OpenSSL update
Ubuntu 24.04 LTS
USN-6663-1 provided a security update for OpenSSL. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl3t64 - 3.0.13-0ubuntu3.1 libssl-dev - 3.0.13-0ubuntu3.1 openssl - 3.0.13-0ubuntu3.1 libssl-doc - 3.0.13-0ubuntu3.1 No subscription required
None
https://launchpad.net/bugs/2054090
USN-6673-3 -- python-cryptography vulnerability
Ubuntu 24.04 LTS
USN-6673-1 provided a security update for python-cryptography. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-cryptography - 41.0.7-4ubuntu0.1 python-cryptography-doc - 41.0.7-4ubuntu0.1 No subscription required
Medium
CVE-2024-26130
USN-6715-2 -- unixODBC vulnerability
Ubuntu 24.04 LTS
USN-6715-1 fixed a vulnerability in unixODBC. This update provides the corresponding fix for Ubuntu 24.04 LTS. Original advisory details: It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.24.04.1 unixodbc-dev - 2.3.12-1ubuntu0.24.04.1 unixodbc-common - 2.3.12-1ubuntu0.24.04.1 unixodbc - 2.3.12-1ubuntu0.24.04.1 odbcinst - 2.3.12-1ubuntu0.24.04.1 libodbcinst2 - 2.3.12-1ubuntu0.24.04.1 libodbccr2 - 2.3.12-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-1013
USN-6718-3 -- curl vulnerabilities
Ubuntu 24.04 LTS
USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 8.5.0-2ubuntu10.1 libcurl4-openssl-dev - 8.5.0-2ubuntu10.1 libcurl3t64-gnutls - 8.5.0-2ubuntu10.1 libcurl4-doc - 8.5.0-2ubuntu10.1 curl - 8.5.0-2ubuntu10.1 libcurl4t64 - 8.5.0-2ubuntu10.1 No subscription required
Medium
CVE-2024-2004
CVE-2024-2398
USN-6729-3 -- Apache HTTP Server vulnerabilities
Ubuntu 24.04 LTS
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2-data - 2.4.58-1ubuntu8.1 libapache2-mod-md - 2.4.58-1ubuntu8.1 apache2-utils - 2.4.58-1ubuntu8.1 apache2-dev - 2.4.58-1ubuntu8.1 apache2-suexec-pristine - 2.4.58-1ubuntu8.1 apache2-suexec-custom - 2.4.58-1ubuntu8.1 apache2 - 2.4.58-1ubuntu8.1 apache2-doc - 2.4.58-1ubuntu8.1 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.1 apache2-ssl-dev - 2.4.58-1ubuntu8.1 apache2-bin - 2.4.58-1ubuntu8.1 No subscription required
Medium
CVE-2023-38709
CVE-2024-24795
CVE-2024-27316
USN-6733-2 -- GnuTLS vulnerabilities
Ubuntu 24.04 LTS
USN-6733-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.1 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.1 libgnutls28-dev - 3.8.3-1.1ubuntu3.1 gnutls-doc - 3.8.3-1.1ubuntu3.1 libgnutls30t64 - 3.8.3-1.1ubuntu3.1 gnutls-bin - 3.8.3-1.1ubuntu3.1 No subscription required
Medium
CVE-2024-28834
CVE-2024-28835
USN-6734-2 -- libvirt vulnerabilities
Ubuntu 24.04 LTS
USN-6734-1 fixed vulnerabilities in libvirt. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) Update Instructions: Run `sudo pro fix USN-6734-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.1 libvirt-dev - 10.0.0-2ubuntu8.1 libvirt-wireshark - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.1 libvirt-login-shell - 10.0.0-2ubuntu8.1 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.1 libnss-libvirt - 10.0.0-2ubuntu8.1 libvirt-daemon - 10.0.0-2ubuntu8.1 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.1 libvirt-daemon-config-network - 10.0.0-2ubuntu8.1 libvirt-l10n - 10.0.0-2ubuntu8.1 libvirt-clients - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.1 libvirt-daemon-system - 10.0.0-2ubuntu8.1 libvirt0 - 10.0.0-2ubuntu8.1 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.1 libvirt-sanlock - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.1 libvirt-doc - 10.0.0-2ubuntu8.1 No subscription required
Medium
CVE-2024-1441
CVE-2024-2494
USN-6736-2 -- klibc vulnerabilities
Ubuntu 24.04 LTS
USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-4ubuntu0.1 libklibc - 2.0.13-4ubuntu0.1 libklibc-dev - 2.0.13-4ubuntu0.1 No subscription required
Medium
CVE-2016-9840
CVE-2016-9841
CVE-2018-25032
CVE-2022-37434
USN-6737-2 -- GNU C Library vulnerability
Ubuntu 24.04 LTS
USN-6737-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.1 glibc-doc - 2.39-0ubuntu8.1 locales-all - 2.39-0ubuntu8.1 libc6-i386 - 2.39-0ubuntu8.1 libc6-s390 - 2.39-0ubuntu8.1 libc6-dev-i386 - 2.39-0ubuntu8.1 libc6-dev-s390 - 2.39-0ubuntu8.1 libc6-dev - 2.39-0ubuntu8.1 libc6-amd64 - 2.39-0ubuntu8.1 libc6-x32 - 2.39-0ubuntu8.1 libc6-dev-amd64 - 2.39-0ubuntu8.1 libc-dev-bin - 2.39-0ubuntu8.1 libc6 - 2.39-0ubuntu8.1 nscd - 2.39-0ubuntu8.1 libc-devtools - 2.39-0ubuntu8.1 glibc-source - 2.39-0ubuntu8.1 libc6-dev-x32 - 2.39-0ubuntu8.1 locales - 2.39-0ubuntu8.1 No subscription required
Medium
CVE-2024-2961
USN-6744-3 -- Pillow vulnerability
Ubuntu 24.04 LTS
USN-6744-1 fixed a vulnerability in Pillow. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pil.imagetk - 10.2.0-1ubuntu1 python-pil-doc - 10.2.0-1ubuntu1 python3-pil - 10.2.0-1ubuntu1 No subscription required
Medium
CVE-2024-28219
USN-6746-2 -- Google Guest Agent and Google OS Config Agent vulnerability
Ubuntu 24.04 LTS
USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google OS Config Agent. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-guest-agent - 20240213.00-0ubuntu3.1 No subscription required google-osconfig-agent - 20240320.00-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-24786
USN-6754-2 -- nghttp2 vulnerability
Ubuntu 24.04 LTS
USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.59.0-1ubuntu0.1 libnghttp2-doc - 1.59.0-1ubuntu0.1 libnghttp2-dev - 1.59.0-1ubuntu0.1 nghttp2-proxy - 1.59.0-1ubuntu0.1 nghttp2 - 1.59.0-1ubuntu0.1 nghttp2-client - 1.59.0-1ubuntu0.1 nghttp2-server - 1.59.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-28182
USN-6756-1 -- less vulnerability
Ubuntu 24.04 LTS
It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu2.1 No subscription required
Medium
CVE-2024-32487
USN-6759-1 -- FreeRDP vulnerabilities
Ubuntu 24.04 LTS
It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6759-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwinpr3-dev - 3.5.1+dfsg1-0ubuntu1 libfreerdp-server3-3 - 3.5.1+dfsg1-0ubuntu1 winpr3-utils - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-dev - 3.5.1+dfsg1-0ubuntu1 freerdp3-shadow-x11 - 3.5.1+dfsg1-0ubuntu1 libfreerdp3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-client3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-wayland - 3.5.1+dfsg1-0ubuntu1 libwinpr-tools3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow-subsystem3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-x11 - 3.5.1+dfsg1-0ubuntu1 libwinpr3-3 - 3.5.1+dfsg1-0ubuntu1 No subscription required
Medium
CVE-2024-32658
CVE-2024-32659
CVE-2024-32660
CVE-2024-32661
CVE-2024-32662
USN-6761-1 -- Anope vulnerability
Ubuntu 24.04 LTS
It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu1 No subscription required
Medium
CVE-2024-30187
USN-6763-1 -- libvirt vulnerability
Ubuntu 24.04 LTS
Martin Širokov discovered that libvirt incorrectly handled certain memory operations. A local attacker could possibly use this issue to access virtproxyd without authorization. Update Instructions: Run `sudo pro fix USN-6763-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.2 libvirt-dev - 10.0.0-2ubuntu8.2 libvirt-wireshark - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.2 libvirt-login-shell - 10.0.0-2ubuntu8.2 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.2 libnss-libvirt - 10.0.0-2ubuntu8.2 libvirt-daemon - 10.0.0-2ubuntu8.2 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.2 libvirt-daemon-config-network - 10.0.0-2ubuntu8.2 libvirt-l10n - 10.0.0-2ubuntu8.2 libvirt-clients - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.2 libvirt-daemon-system - 10.0.0-2ubuntu8.2 libvirt0 - 10.0.0-2ubuntu8.2 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.2 libvirt-sanlock - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.2 libvirt-doc - 10.0.0-2ubuntu8.2 No subscription required
Medium
CVE-2024-4418
USN-6768-1 -- GLib vulnerability
Ubuntu 24.04 LTS
Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation. Update Instructions: Run `sudo pro fix USN-6768-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-glib-2.0 - 2.80.0-6ubuntu3.1 libgirepository-2.0-dev - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-0t64 - 2.80.0-6ubuntu3.1 libglib2.0-tests - 2.80.0-6ubuntu3.1 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.1 libgirepository-2.0-0 - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.1 libglib2.0-data - 2.80.0-6ubuntu3.1 libglib2.0-doc - 2.80.0-6ubuntu3.1 libglib2.0-bin - 2.80.0-6ubuntu3.1 libglib2.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-dev-bin - 2.80.0-6ubuntu3.1 No subscription required
Medium
CVE-2024-34397
USN-6770-1 -- Fossil regression
Ubuntu 24.04 LTS
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience. Update Instructions: Run `sudo pro fix USN-6770-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fossil - 1:2.23-1ubuntu0.1 No subscription required
None
https://launchpad.net/bugs/2064509
USN-6771-1 -- SQL parse vulnerability
Ubuntu 24.04 LTS
It was discovered that SQL parse incorrectly handled certain nested lists. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6771-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-sqlparse-doc - 0.4.4-1ubuntu0.1 python3-sqlparse - 0.4.4-1ubuntu0.1 sqlformat - 0.4.4-1ubuntu0.1 No subscription required
Medium
CVE-2024-4340
USN-6773-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. (CVE-2024-30045) It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service. (CVE-2024-30046) Update Instructions: Run `sudo pro fix USN-6773-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.105-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.105-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.105-8.0.5-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-30045
CVE-2024-30046
USN-6780-1 -- idna vulnerability
Ubuntu 24.04 LTS
Guido Vranken discovered that idna did not properly manage certain inputs, which could lead to significant resource consumption. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6780-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-idna - 3.6-2ubuntu0.1 No subscription required
Medium
CVE-2024-3651
USN-6784-1 -- cJSON vulnerabilities
Ubuntu 24.04 LTS
It was discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472) Luo Jin discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. (CVE-2024-31755) Update Instructions: Run `sudo pro fix USN-6784-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcjson-dev - 1.7.17-1ubuntu0.1~esm2 libcjson1 - 1.7.17-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-50471
CVE-2023-50472
CVE-2024-31755
USN-6785-1 -- GNOME Remote Desktop vulnerability
Ubuntu 24.04 LTS
Matthias Gerstner discovered that GNOME Remote Desktop incorrectly performed certain user validation checks. A local attacker could possibly use this issue to obtain sensitive information, or take control of remote desktop connections. Update Instructions: Run `sudo pro fix USN-6785-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-remote-desktop - 46.2-1~ubuntu24.04.2 No subscription required
Medium
CVE-2024-5148
USN-6787-1 -- Jinja2 vulnerability
Ubuntu 24.04 LTS
It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-6787-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.1 python3-jinja2 - 3.1.2-1ubuntu1.1 No subscription required
Medium
CVE-2024-34064
USN-6788-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6788-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.2-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.2-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-27834
USN-6789-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled graphic on-click bindings. If a user were tricked into clicking a graphic in a specially crafted document, a remote attacker could possibly run arbitrary script. Update Instructions: Run `sudo pro fix USN-6789-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.3-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.3-0ubuntu0.24.04.2 python3-access2base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.3-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.3-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.3-0ubuntu0.24.04.2 ure-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.3-0ubuntu0.24.04.2 libridl-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.3-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.3-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.3-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.3-0ubuntu0.24.04.2 libunoil-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.3-0ubuntu0.24.04.2 python3-uno - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.3-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.3-0ubuntu0.24.04.2 libjurt-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.3-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.3-0ubuntu0.24.04.2 ure - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.3-0ubuntu0.24.04.2 libjuh-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.3-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.3-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-3044
USN-6790-1 -- amavisd-new vulnerability
Ubuntu 24.04 LTS
It was discovered that amavisd-new incorrectly handled certain MIME email messages with multiple boundary parameters. A remote attacker could possibly use this issue to bypass checks for banned files or malware. Update Instructions: Run `sudo pro fix USN-6790-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amavisd-new-postfix - 1:2.13.0-3ubuntu2 amavisd-new - 1:2.13.0-3ubuntu2 No subscription required
Medium
CVE-2024-28054
USN-6791-1 -- Unbound vulnerability
Ubuntu 24.04 LTS
It was discovered that Unbound could take part in a denial of service amplification attack known as DNSBomb. This update introduces certain resource limits to make the impact from Unbound significantly lower. Update Instructions: Run `sudo pro fix USN-6791-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unbound - 1.19.2-1ubuntu3.1 python3-unbound - 1.19.2-1ubuntu3.1 libunbound8 - 1.19.2-1ubuntu3.1 unbound-anchor - 1.19.2-1ubuntu3.1 unbound-host - 1.19.2-1ubuntu3.1 libunbound-dev - 1.19.2-1ubuntu3.1 No subscription required
Low
CVE-2024-33655
USN-6793-1 -- Git vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32004) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. (CVE-2024-32021) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32465) Update Instructions: Run `sudo pro fix USN-6793-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.1 gitweb - 1:2.43.0-1ubuntu7.1 git-gui - 1:2.43.0-1ubuntu7.1 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.1 gitk - 1:2.43.0-1ubuntu7.1 git-all - 1:2.43.0-1ubuntu7.1 git-mediawiki - 1:2.43.0-1ubuntu7.1 git-daemon-run - 1:2.43.0-1ubuntu7.1 git-man - 1:2.43.0-1ubuntu7.1 git-doc - 1:2.43.0-1ubuntu7.1 git-svn - 1:2.43.0-1ubuntu7.1 git-cvs - 1:2.43.0-1ubuntu7.1 git-email - 1:2.43.0-1ubuntu7.1 No subscription required
Medium
CVE-2024-32002
CVE-2024-32004
CVE-2024-32020
CVE-2024-32021
CVE-2024-32465
USN-6794-1 -- FRR vulnerabilities
Ubuntu 24.04 LTS
It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6794-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.1 frr-snmp - 8.4.4-1.1ubuntu6.1 frr-doc - 8.4.4-1.1ubuntu6.1 frr-pythontools - 8.4.4-1.1ubuntu6.1 No subscription required
Medium
CVE-2024-31948
CVE-2024-31950
CVE-2024-31951
CVE-2024-34088
USN-6796-1 -- TPM2 Software Stack vulnerabilities
Ubuntu 24.04 LTS
Fergus Dall discovered that TPM2 Software Stack did not properly handle layer arrays. An attacker could possibly use this issue to cause TPM2 Software Stack to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-22745) Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not validate the quote data after deserialization. An attacker could generate an arbitrary quote and cause TPM2 Software Stack to have unknown behavior. (CVE-2024-29040) Update Instructions: Run `sudo pro fix USN-6796-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtss2-esys-3.0.2-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-sys1t64 - 4.0.1-7.1ubuntu5.1 libtss2-mu-4.0.1-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-spi-helper0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-libtpms0t64 - 4.0.1-7.1ubuntu5.1 libtss2-doc - 4.0.1-7.1ubuntu5.1 libtss2-tcti-swtpm0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-device0t64 - 4.0.1-7.1ubuntu5.1 libtss2-rc0t64 - 4.0.1-7.1ubuntu5.1 libtss2-fapi1t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-mssim0t64 - 4.0.1-7.1ubuntu5.1 libtss2-policy0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-pcap0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tctildr0t64 - 4.0.1-7.1ubuntu5.1 libtss2-dev - 4.0.1-7.1ubuntu5.1 libtss2-tcti-cmd0t64 - 4.0.1-7.1ubuntu5.1 No subscription required
Medium
CVE-2023-22745
CVE-2024-29040
USN-6797-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors did not properly restrict access to certain hardware features when using Intel® SGX or Intel® TDX. This may allow a privileged local user to potentially further escalate their privileges on the system. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-22655) It was discovered that some Intel® Atom® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746) It was discovered that some Intel® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-38575) It was discovered that some Intel® Processors did not properly enforce bus lock regulator protections. A remote attacker could use this to cause a denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368) It was discovered that some Intel® Xeon® D Processors did not properly calculate the SGX base key when using Intel® SGX. A privileged local attacker could use this to obtain sensitive information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-43490) It was discovered that some Intel® Processors did not properly protect against concurrent accesses. A local attacker could use this to obtain sensitive information. (CVE-2023-45733) It was discovered that some Intel® Processors TDX module software did not properly validate input. A privileged local attacker could use this information to potentially further escalate their privileges on the system. (CVE-2023-45745, CVE-2023-47855) It was discovered that some Intel® Core™ Ultra processors did not properly handle particular instruction sequences. A local attacker could use this issue to cause a denial of service. (CVE-2023-46103) Update Instructions: Run `sudo pro fix USN-6797-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240514.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2023-22655
CVE-2023-28746
CVE-2023-38575
CVE-2023-39368
CVE-2023-43490
CVE-2023-45733
CVE-2023-45745
CVE-2023-46103
CVE-2023-47855
USN-6798-1 -- GStreamer Base Plugins vulnerability
Ubuntu 24.04 LTS
It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6798-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-x - 1.24.2-1ubuntu0.1 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-gl - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.1 gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-alsa - 1.24.2-1ubuntu0.1 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.1 No subscription required
Medium
CVE-2024-4453
USN-6799-1 -- Werkzeug vulnerability
Ubuntu 24.04 LTS
It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances. Update Instructions: Run `sudo pro fix USN-6799-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-werkzeug - 3.0.1-3ubuntu0.1 python-werkzeug-doc - 3.0.1-3ubuntu0.1 No subscription required
Medium
CVE-2024-34069
USN-6801-1 -- PyMySQL vulnerability
Ubuntu 24.04 LTS
It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-6801-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pymysql - 1.0.2-2ubuntu1.1 python-pymysql-doc - 1.0.2-2ubuntu1.1 No subscription required
Medium
CVE-2024-36039
USN-6802-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users. NOTE: This update will only fix fresh PostgreSQL installations. Current PostgreSQL installations will remain vulnerable to this issue until manual steps are performed. Please see the instructions in the changelog located at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated packages have been installed, or in the PostgreSQL release notes located here: https://www.postgresql.org/docs/16/release-16-3.html https://www.postgresql.org/docs/15/release-15-7.html https://www.postgresql.org/docs/14/release-14-12.html Update Instructions: Run `sudo pro fix USN-6802-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postgresql-server-dev-16 - 16.3-0ubuntu0.24.04.1 libecpg6 - 16.3-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.3-0ubuntu0.24.04.1 libpq-dev - 16.3-0ubuntu0.24.04.1 postgresql-16 - 16.3-0ubuntu0.24.04.1 libpgtypes3 - 16.3-0ubuntu0.24.04.1 libecpg-dev - 16.3-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.3-0ubuntu0.24.04.1 libpq5 - 16.3-0ubuntu0.24.04.1 postgresql-client-16 - 16.3-0ubuntu0.24.04.1 postgresql-doc-16 - 16.3-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.3-0ubuntu0.24.04.1 libecpg-compat3 - 16.3-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-4317
USN-6803-1 -- FFmpeg vulnerabilities
Ubuntu 24.04 LTS
Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49502) Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49528) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50007) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50008) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-50009) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010) Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51793) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31582) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585) Update Instructions: Run `sudo pro fix USN-6803-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm1 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm1 libavcodec-dev - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm1 libavcodec60 - 7:6.1.1-3ubuntu5+esm1 libavdevice-dev - 7:6.1.1-3ubuntu5+esm1 libavdevice60 - 7:6.1.1-3ubuntu5+esm1 libavfilter-dev - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm1 libavfilter9 - 7:6.1.1-3ubuntu5+esm1 libavformat-dev - 7:6.1.1-3ubuntu5+esm1 libavformat-extra - 7:6.1.1-3ubuntu5+esm1 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm1 libavformat60 - 7:6.1.1-3ubuntu5+esm1 libavutil-dev - 7:6.1.1-3ubuntu5+esm1 libavutil58 - 7:6.1.1-3ubuntu5+esm1 libpostproc-dev - 7:6.1.1-3ubuntu5+esm1 libpostproc57 - 7:6.1.1-3ubuntu5+esm1 libswresample-dev - 7:6.1.1-3ubuntu5+esm1 libswresample4 - 7:6.1.1-3ubuntu5+esm1 libswscale-dev - 7:6.1.1-3ubuntu5+esm1 libswscale7 - 7:6.1.1-3ubuntu5+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-49501
CVE-2023-49502
CVE-2023-49528
CVE-2023-50007
CVE-2023-50008
CVE-2023-50009
CVE-2023-50010
CVE-2023-51793
CVE-2023-51794
CVE-2023-51795
CVE-2023-51796
CVE-2023-51798
CVE-2024-31578
CVE-2024-31582
CVE-2024-31585
USN-6804-1 -- GNU C Library vulnerabilities
Ubuntu 24.04 LTS
It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33599) It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33600) It was discovered that GNU C Library nscd daemon did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33601) It was discovered that GNU C Library nscd daemon did not properly handle memory allocation, which could lead to memory corruption. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33602) Update Instructions: Run `sudo pro fix USN-6804-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.2 glibc-doc - 2.39-0ubuntu8.2 libc6-i386 - 2.39-0ubuntu8.2 libc6-s390 - 2.39-0ubuntu8.2 libc6-dev-i386 - 2.39-0ubuntu8.2 nscd - 2.39-0ubuntu8.2 libc6-dev-x32 - 2.39-0ubuntu8.2 libc6-dev - 2.39-0ubuntu8.2 libc6-amd64 - 2.39-0ubuntu8.2 libc6-x32 - 2.39-0ubuntu8.2 libc6-dev-amd64 - 2.39-0ubuntu8.2 libc-dev-bin - 2.39-0ubuntu8.2 libc6 - 2.39-0ubuntu8.2 locales-all - 2.39-0ubuntu8.2 libc-devtools - 2.39-0ubuntu8.2 glibc-source - 2.39-0ubuntu8.2 libc6-dev-s390 - 2.39-0ubuntu8.2 locales - 2.39-0ubuntu8.2 No subscription required
Medium
CVE-2024-33599
CVE-2024-33600
CVE-2024-33601
CVE-2024-33602
USN-6805-1 -- libarchive vulnerability
Ubuntu 24.04 LTS
It was discovered that libarchive incorrectly handled certain RAR archive files. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6805-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.1 libarchive13t64 - 3.7.2-2ubuntu0.1 libarchive-tools - 3.7.2-2ubuntu0.1 No subscription required
Medium
CVE-2024-26256
USN-6806-1 -- GDK-PixBuf vulnerability
Ubuntu 24.04 LTS
Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf library did not properly handle certain ANI files. An attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or to possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6806-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgdk-pixbuf-2.0-dev - 2.42.10+dfsg-3ubuntu3.1 gdk-pixbuf-tests - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-common - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-bin - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-doc - 2.42.10+dfsg-3ubuntu3.1 gir1.2-gdkpixbuf-2.0 - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf-2.0-0 - 2.42.10+dfsg-3ubuntu3.1 No subscription required
Medium
CVE-2022-48622
USN-6810-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094) Update Instructions: Run `sudo pro fix USN-6810-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-doc - 8u412-ga-1~24.04.2 openjdk-8-jdk - 8u412-ga-1~24.04.2 openjdk-8-jre-headless - 8u412-ga-1~24.04.2 openjdk-8-jre - 8u412-ga-1~24.04.2 openjdk-8-jdk-headless - 8u412-ga-1~24.04.2 openjdk-8-source - 8u412-ga-1~24.04.2 openjdk-8-jre-zero - 8u412-ga-1~24.04.2 openjdk-8-demo - 8u412-ga-1~24.04.2 No subscription required
Medium
CVE-2024-21011
CVE-2024-21068
CVE-2024-21085
CVE-2024-21094
USN-6814-1 -- libvpx vulnerability
Ubuntu 24.04 LTS
Xiantong Hou discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6814-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.1 libvpx9 - 1.14.0-1ubuntu2.1 libvpx-doc - 1.14.0-1ubuntu2.1 vpx-tools - 1.14.0-1ubuntu2.1 No subscription required
Medium
CVE-2024-5197
USN-6815-1 -- AOM vulnerability
Ubuntu 24.04 LTS
Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6815-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaom-doc - 3.8.2-2ubuntu0.1 libaom-dev - 3.8.2-2ubuntu0.1 libaom3 - 3.8.2-2ubuntu0.1 aom-tools - 3.8.2-2ubuntu0.1 No subscription required
Medium
CVE-2024-5171
USN-6816-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053, CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870, CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929, CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975, CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871, CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653, CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796, CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826, CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895, CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801, CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049, CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661, CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956, CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873, CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650, CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038, CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959, CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433, CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939, CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029, CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074, CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391, CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026, CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662, CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068, CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389, CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798, CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046, CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954, CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883, CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948, CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869, CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073, CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894, CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076, CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957, CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813, CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968, CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874, CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809, CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808, CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969, CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078, CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955, CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945, CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054, CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656, CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865, CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950, CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971, CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036, CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075, CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970, CVE-2024-27031) Update Instructions: Run `sudo pro fix USN-6816-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-raspi-tools-6.8.0-1005 - 6.8.0-1005.5 linux-buildinfo-6.8.0-1005-raspi - 6.8.0-1005.5 linux-tools-raspi - 6.8.0-1005.5 linux-tools-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-raspi - 6.8.0-1005.5 linux-image-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi-headers-6.8.0-1005 - 6.8.0-1005.5 linux-image-raspi - 6.8.0-1005.5 linux-modules-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi - 6.8.0-1005.5 No subscription required linux-modules-extra-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-source-6.8.0 - 6.8.0-1006.6 linux-tools-ibm - 6.8.0-1006.6 linux-tools-ibm-lts-24.04 - 6.8.0-1006.6 linux-image-ibm - 6.8.0-1006.6 linux-image-ibm-classic - 6.8.0-1006.6 linux-headers-ibm-lts-24.04 - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-ibm - 6.8.0-1006.6 linux-tools-ibm-classic - 6.8.0-1006.6 linux-tools-6.8.0-1006-ibm - 6.8.0-1006.6 linux-headers-6.8.0-1006-ibm - 6.8.0-1006.6 linux-image-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-classic - 6.8.0-1006.6 linux-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-classic - 6.8.0-1006.6 linux-modules-iwlwifi-ibm - 6.8.0-1006.6 linux-image-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-headers-6.8.0-1006 - 6.8.0-1006.6 linux-headers-ibm-classic - 6.8.0-1006.6 linux-ibm - 6.8.0-1006.6 linux-ibm-cloud-tools-common - 6.8.0-1006.6 linux-headers-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-ibm - 6.8.0-1006.6 No subscription required linux-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-common - 6.8.0-35.35 linux-headers-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-virtual - 6.8.0-35.35 linux-headers-generic-lpae - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04d - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-laptop-23.10 - 6.8.0-35.35 linux-kvm - 6.8.0-35.35 linux-tools-6.8.0-35 - 6.8.0-35.35 linux-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-generic-64k - 6.8.0-35.35 linux-image-virtual - 6.8.0-35.35 linux-doc - 6.8.0-35.35 linux-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic - 6.8.0-35.35 linux-image-generic - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-image-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic-64k - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-virtual-hwe-24.04 - 6.8.0-35.35 linux-modules-usbio-6.8.0-35-generic - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-oem-20.04c - 6.8.0-35.35 linux-modules-ipu6-6.8.0-35-generic - 6.8.0-35.35 linux-tools-oem-20.04b - 6.8.0-35.35 linux-modules-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-modules-iwlwifi-6.8.0-35-generic - 6.8.0-35.35 linux-modules-6.8.0-35-generic - 6.8.0-35.35 linux-crashdump - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04 - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic - 6.8.0-35.35 linux-headers-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-iwlwifi-generic - 6.8.0-35.35 linux-modules-extra-6.8.0-35-generic - 6.8.0-35.35 linux-source - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-oem-22.04 - 6.8.0-35.35 linux-image-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-kvm - 6.8.0-35.35 linux-tools-generic-lpae - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-virtual - 6.8.0-35.35 linux-tools-oem-22.04 - 6.8.0-35.35 linux-tools-generic - 6.8.0-35.35 linux-laptop-23.10 - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-tools-6.8.0-35-generic-64k - 6.8.0-35.35 linux-tools-6.8.0-35-generic - 6.8.0-35.35 linux-image-uc-generic - 6.8.0-35.35 linux-cloud-tools-generic - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-35.35 linux-image-oem-20.04c - 6.8.0-35.35 linux-image-oem-20.04b - 6.8.0-35.35 linux-generic-lpae - 6.8.0-35.35 linux-tools-host - 6.8.0-35.35 linux-headers-generic-64k - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04 - 6.8.0-35.35 linux-generic - 6.8.0-35.35 linux-image-oem-20.04 - 6.8.0-35.35 linux-oem-20.04d - 6.8.0-35.35 linux-headers-generic-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04c - 6.8.0-35.35 linux-image-oem-22.04 - 6.8.0-35.35 linux-headers-6.8.0-35-generic - 6.8.0-35.35 linux-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-lib-rust-6.8.0-35-generic - 6.8.0-35.35 linux-image-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-6.8.0-35 - 6.8.0-35.35 linux-tools-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-common - 6.8.0-35.35 linux-image-generic-lpae - 6.8.0-35.35 linux-oem-20.04b - 6.8.0-35.35 linux-image-extra-virtual - 6.8.0-35.35 linux-modules-ipu6-generic - 6.8.0-35.35 linux-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-image-laptop-23.10 - 6.8.0-35.35 linux-image-generic-hwe-24.04-edge - 6.8.0-35.35 linux-cloud-tools-6.8.0-35-generic - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04 - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04 - 6.8.0-35.35 linux-headers-generic-hwe-24.04-edge - 6.8.0-35.35 linux-generic-64k - 6.8.0-35.35 linux-headers-generic - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-laptop-23.10 - 6.8.0-35.35 linux-libc-dev - 6.8.0-35.35 linux-modules-iwlwifi-oem-22.04 - 6.8.0-35.35 linux-headers-virtual - 6.8.0-35.35 linux-image-kvm - 6.8.0-35.35 linux-source-6.8.0 - 6.8.0-35.35 linux-headers-oem-22.04 - 6.8.0-35.35 linux-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-tools-kvm - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic-64k - 6.8.0-35.35 linux-headers-oem-20.04b - 6.8.0-35.35 linux-headers-oem-20.04c - 6.8.0-35.35 linux-tools-virtual - 6.8.0-35.35 linux-headers-oem-20.04d - 6.8.0-35.35 linux-cloud-tools-6.8.0-35 - 6.8.0-35.35 linux-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic - 6.8.0-35.35 No subscription required linux-image-uc-6.8.0-35-generic-64k - 6.8.0-35.35+1 linux-image-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-uc-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-6.8.0-35-generic-64k - 6.8.0-35.35+1 No subscription required linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-common - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-common - 6.8.0-35.35.1 linux-tools-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-host - 6.8.0-35.35.1 linux-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-lowlatency-headers-6.8.0-35 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-modules-iwlwifi-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-6.8.0-35 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-lowlatency-64k - 6.8.0-35.35.1 linux-cloud-tools-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-lib-rust-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-6.8.0-35 - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency - 6.8.0-35.35.1 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-21823
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gcp-headers-6.8.0-1008 - 6.8.0-1008.9 linux-image-gcp - 6.8.0-1008.9 linux-modules-extra-6.8.0-1008-gcp - 6.8.0-1008.9 linux-headers-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-gcp - 6.8.0-1008.9 linux-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-gcp - 6.8.0-1008.9 linux-gcp-tools-6.8.0-1008 - 6.8.0-1008.9 linux-headers-gcp - 6.8.0-1008.9 linux-image-unsigned-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-6.8.0-1008-gcp - 6.8.0-1008.9 linux-image-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-extra-gcp - 6.8.0-1008.9 linux-buildinfo-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-6.8.0-1008-gcp - 6.8.0-1008.9 No subscription required linux-modules-extra-aws - 6.8.0-1009.9 linux-tools-aws - 6.8.0-1009.9 linux-aws-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-aws - 6.8.0-1009.9 linux-image-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-headers-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws - 6.8.0-1009.9 linux-headers-aws - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-headers-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-aws - 6.8.0-1009.9 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-2 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-ipu6-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-6.8.0-1006-oem - 6.8.0-1006.6 linux-tools-6.8.0-1006-oem - 6.8.0-1006.6 linux-headers-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-uc-6.8.0-1006-oem - 6.8.0-1006.6 linux-oem-6.8-tools-6.8.0-1006 - 6.8.0-1006.6 linux-oem-6.8-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oem - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-usbio-6.8.0-1006-oem - 6.8.0-1006.6 No subscription required linux-tools-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04 - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04a - 6.8.0-1006.6+1 linux-headers-oem-24.04a - 6.8.0-1006.6+1 linux-tools-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04a - 6.8.0-1006.6+1 linux-oem-24.04a - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04 - 6.8.0-1006.6+1 linux-oem-24.04 - 6.8.0-1006.6+1 linux-headers-oem-24.04 - 6.8.0-1006.6+1 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gke-headers-6.8.0-1004 - 6.8.0-1004.7 linux-modules-iwlwifi-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-gke - 6.8.0-1004.7 linux-image-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-extra-6.8.0-1004-gke - 6.8.0-1004.7 linux-gke - 6.8.0-1004.7 linux-buildinfo-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-gke - 6.8.0-1004.7 linux-gke-tools-6.8.0-1004 - 6.8.0-1004.7 linux-headers-gke - 6.8.0-1004.7 linux-modules-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-iwlwifi-gke - 6.8.0-1004.7 linux-headers-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-unsigned-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-6.8.0-1004-gke - 6.8.0-1004.7 No subscription required linux-image-6.8.0-1008-azure - 6.8.0-1008.8 linux-image-azure-fde - 6.8.0-1008.8 linux-azure-tools-6.8.0-1008 - 6.8.0-1008.8 linux-azure - 6.8.0-1008.8 linux-azure-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-azure - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-azure - 6.8.0-1008.8 linux-cloud-tools-azure - 6.8.0-1008.8 linux-headers-6.8.0-1008-azure - 6.8.0-1008.8 linux-tools-azure - 6.8.0-1008.8 linux-modules-iwlwifi-azure - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-azure - 6.8.0-1008.8 linux-image-6.8.0-1008-azure-fde - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-fde - 6.8.0-1008.8 linux-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-cloud-tools-6.8.0-1008 - 6.8.0-1008.8 linux-headers-azure - 6.8.0-1008.8 linux-cloud-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-azure - 6.8.0-1008.8 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6823-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.37 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-37.html https://www.oracle.com/security-alerts/cpuapr2024.html Update Instructions: Run `sudo pro fix USN-6823-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 8.0.37-0ubuntu0.24.04.1 libmysqlclient-dev - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-router - 8.0.37-0ubuntu0.24.04.1 mysql-server - 8.0.37-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.37-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite - 8.0.37-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.37-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20994
CVE-2024-20998
CVE-2024-21000
CVE-2024-21008
CVE-2024-21009
CVE-2024-21013
CVE-2024-21047
CVE-2024-21054
CVE-2024-21060
CVE-2024-21062
CVE-2024-21069
CVE-2024-21087
CVE-2024-21096
CVE-2024-21102
USN-6827-1 -- LibTIFF vulnerability
Ubuntu 24.04 LTS
It was discovered that LibTIFF incorrectly handled memory when performing certain cropping operations, leading to a heap buffer overflow. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6827-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl - 4.5.1+git230720-4ubuntu2.1 libtiff5-dev - 4.5.1+git230720-4ubuntu2.1 libtiff-dev - 4.5.1+git230720-4ubuntu2.1 libtiffxx6 - 4.5.1+git230720-4ubuntu2.1 libtiff6 - 4.5.1+git230720-4ubuntu2.1 libtiff-tools - 4.5.1+git230720-4ubuntu2.1 libtiff-doc - 4.5.1+git230720-4ubuntu2.1 No subscription required
Low
CVE-2023-3164
USN-6830-1 -- libndp vulnerability
Ubuntu 24.04 LTS
It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6830-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libndp0 - 1.8-1fakesync1ubuntu0.24.04.1 libndp-dev - 1.8-1fakesync1ubuntu0.24.04.1 libndp-tools - 1.8-1fakesync1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5564
USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities
Ubuntu 24.04 LTS
Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31607, CVE-2023-31608, CVE-2023-31609, CVE-2023-31610, CVE-2023-31611, CVE-2023-31616, CVE-2023-31617, CVE-2023-31618, CVE-2023-31619, CVE-2023-31623, CVE-2023-31625, CVE-2023-31628) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-31612, CVE-2023-31613, CVE-2023-31614, CVE-2023-31615) Update Instructions: Run `sudo pro fix USN-6832-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-31607
CVE-2023-31608
CVE-2023-31609
CVE-2023-31610
CVE-2023-31611
CVE-2023-31612
CVE-2023-31613
CVE-2023-31614
CVE-2023-31615
CVE-2023-31616
CVE-2023-31617
CVE-2023-31618
CVE-2023-31619
CVE-2023-31623
CVE-2023-31625
CVE-2023-31628
USN-6833-1 -- VTE vulnerability
Ubuntu 24.04 LTS
Siddharth Dushantha discovered that VTE incorrectly handled large window resize escape sequences. An attacker could possibly use this issue to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6833-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvte-2.91-gtk4-dev - 0.76.0-1ubuntu0.1 libvte-2.91-common - 0.76.0-1ubuntu0.1 gir1.2-vte-3.91 - 0.76.0-1ubuntu0.1 gir1.2-vte-2.91 - 0.76.0-1ubuntu0.1 libvte-2.91-doc - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-0 - 0.76.0-1ubuntu0.1 libvte-2.91-0 - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-doc - 0.76.0-1ubuntu0.1 libvte-2.91-dev - 0.76.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-37535
USN-6835-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871) Update Instructions: Run `sudo pro fix USN-6835-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.1 libgs10-common - 10.02.1~dfsg1-0ubuntu7.1 libgs10 - 10.02.1~dfsg1-0ubuntu7.1 libgs-common - 10.02.1~dfsg1-0ubuntu7.1 libgs-dev - 10.02.1~dfsg1-0ubuntu7.1 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.1 No subscription required
Medium
CVE-2023-52722
CVE-2024-29510
CVE-2024-33869
CVE-2024-33870
CVE-2024-33871
USN-6836-1 -- SSSD vulnerability
Ubuntu 24.04 LTS
It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources. Update Instructions: Run `sudo pro fix USN-6836-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsss-certmap-dev - 2.9.4-1.1ubuntu6.1 libipa-hbac-dev - 2.9.4-1.1ubuntu6.1 sssd-ad - 2.9.4-1.1ubuntu6.1 libsss-sudo - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap0 - 2.9.4-1.1ubuntu6.1 libnss-sss - 2.9.4-1.1ubuntu6.1 sssd-ipa - 2.9.4-1.1ubuntu6.1 sssd-passkey - 2.9.4-1.1ubuntu6.1 libipa-hbac0t64 - 2.9.4-1.1ubuntu6.1 libsss-idmap-dev - 2.9.4-1.1ubuntu6.1 python3-libsss-nss-idmap - 2.9.4-1.1ubuntu6.1 sssd-common - 2.9.4-1.1ubuntu6.1 python3-sss - 2.9.4-1.1ubuntu6.1 libpam-sss - 2.9.4-1.1ubuntu6.1 sssd - 2.9.4-1.1ubuntu6.1 libsss-idmap0 - 2.9.4-1.1ubuntu6.1 sssd-idp - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap-dev - 2.9.4-1.1ubuntu6.1 sssd-kcm - 2.9.4-1.1ubuntu6.1 libsss-certmap0 - 2.9.4-1.1ubuntu6.1 python3-libipa-hbac - 2.9.4-1.1ubuntu6.1 sssd-ldap - 2.9.4-1.1ubuntu6.1 sssd-tools - 2.9.4-1.1ubuntu6.1 sssd-ad-common - 2.9.4-1.1ubuntu6.1 sssd-krb5-common - 2.9.4-1.1ubuntu6.1 sssd-dbus - 2.9.4-1.1ubuntu6.1 sssd-krb5 - 2.9.4-1.1ubuntu6.1 sssd-proxy - 2.9.4-1.1ubuntu6.1 No subscription required
Medium
CVE-2023-3758
USN-6837-1 -- Rack vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-27530) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6837-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.1 No subscription required
Medium
CVE-2023-27530
CVE-2024-25126
CVE-2024-26141
CVE-2024-26146
USN-6838-1 -- Ruby vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282) Update Instructions: Run `sudo pro fix USN-6838-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby3.2 - 3.2.3-1ubuntu0.24.04.1 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.1 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.1 libruby3.2 - 3.2.3-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-27281
CVE-2024-27282
USN-6839-1 -- MariaDB vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.6.18 in Ubuntu 22.04 LTS and to 10.11.8 in Ubuntu 23.10 and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6839-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mariadb-plugin-provider-lzo - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.8-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-common - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test - 1:10.11.8-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-21096
USN-6841-1 -- PHP vulnerability
Ubuntu 24.04 LTS
It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information. Update Instructions: Run `sudo pro fix USN-6841-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php8.3-cgi - 8.3.6-0ubuntu0.24.04.1 php8.3-xsl - 8.3.6-0ubuntu0.24.04.1 php8.3-fpm - 8.3.6-0ubuntu0.24.04.1 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.1 php8.3-zip - 8.3.6-0ubuntu0.24.04.1 php8.3-curl - 8.3.6-0ubuntu0.24.04.1 php8.3-ldap - 8.3.6-0ubuntu0.24.04.1 php8.3-gmp - 8.3.6-0ubuntu0.24.04.1 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.1 php8.3-gd - 8.3.6-0ubuntu0.24.04.1 php8.3-common - 8.3.6-0ubuntu0.24.04.1 php8.3-enchant - 8.3.6-0ubuntu0.24.04.1 php8.3-odbc - 8.3.6-0ubuntu0.24.04.1 php8.3-cli - 8.3.6-0ubuntu0.24.04.1 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.1 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.1 php8.3-mysql - 8.3.6-0ubuntu0.24.04.1 php8.3-dba - 8.3.6-0ubuntu0.24.04.1 libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-soap - 8.3.6-0ubuntu0.24.04.1 php8.3-opcache - 8.3.6-0ubuntu0.24.04.1 php8.3-sybase - 8.3.6-0ubuntu0.24.04.1 php8.3-pspell - 8.3.6-0ubuntu0.24.04.1 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.1 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.1 php8.3-dev - 8.3.6-0ubuntu0.24.04.1 php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-tidy - 8.3.6-0ubuntu0.24.04.1 php8.3-interbase - 8.3.6-0ubuntu0.24.04.1 php8.3-readline - 8.3.6-0ubuntu0.24.04.1 php8.3-intl - 8.3.6-0ubuntu0.24.04.1 php8.3-imap - 8.3.6-0ubuntu0.24.04.1 php8.3-xml - 8.3.6-0ubuntu0.24.04.1 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.1 php8.3-snmp - 8.3.6-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5458
USN-6843-1 -- Plasma Workspace vulnerability
Ubuntu 24.04 LTS
Fabian Vogt discovered that Plasma Workspace incorrectly handled connections via ICE. A local attacker could possibly use this issue to gain access to another user's session manager and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6843-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plasma-workspace-dev - 4:5.27.11-0ubuntu4.1 libweather-ion7 - 4:5.27.11-0ubuntu4.1 libkfontinst5 - 4:5.27.11-0ubuntu4.1 libcolorcorrect5 - 4:5.27.11-0ubuntu4.1 libkworkspace5-5 - 4:5.27.11-0ubuntu4.1 plasma-workspace-data - 4:5.27.11-0ubuntu4.1 plasma-workspace-wayland - 4:5.27.11-0ubuntu4.1 sddm-theme-breeze - 4:5.27.11-0ubuntu4.1 libplasma-geolocation-interface5 - 4:5.27.11-0ubuntu4.1 libnotificationmanager1 - 4:5.27.11-0ubuntu4.1 libkfontinstui5 - 4:5.27.11-0ubuntu4.1 libtaskmanager6 - 4:5.27.11-0ubuntu4.1 plasma-workspace - 4:5.27.11-0ubuntu4.1 No subscription required
Medium
CVE-2024-36041
USN-6844-1 -- CUPS vulnerability
Ubuntu 24.04 LTS
Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.1 cups-bsd - 2.4.7-1.2ubuntu7.1 cups-common - 2.4.7-1.2ubuntu7.1 cups-core-drivers - 2.4.7-1.2ubuntu7.1 cups-server-common - 2.4.7-1.2ubuntu7.1 cups-client - 2.4.7-1.2ubuntu7.1 libcupsimage2t64 - 2.4.7-1.2ubuntu7.1 libcupsimage2-dev - 2.4.7-1.2ubuntu7.1 cups-ipp-utils - 2.4.7-1.2ubuntu7.1 cups-ppdc - 2.4.7-1.2ubuntu7.1 cups - 2.4.7-1.2ubuntu7.1 libcups2t64 - 2.4.7-1.2ubuntu7.1 cups-daemon - 2.4.7-1.2ubuntu7.1 No subscription required
Medium
CVE-2024-35235
USN-6844-2 -- CUPS regression
Ubuntu 24.04 LTS
USN-6844-1 fixed vulnerabilities in the CUPS package. The update lead to the discovery of a regression in CUPS with regards to how the cupsd daemon handles Listen configuration directive. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.2 cups-bsd - 2.4.7-1.2ubuntu7.2 cups-common - 2.4.7-1.2ubuntu7.2 cups-core-drivers - 2.4.7-1.2ubuntu7.2 cups-server-common - 2.4.7-1.2ubuntu7.2 cups-client - 2.4.7-1.2ubuntu7.2 libcupsimage2t64 - 2.4.7-1.2ubuntu7.2 libcupsimage2-dev - 2.4.7-1.2ubuntu7.2 cups-ipp-utils - 2.4.7-1.2ubuntu7.2 cups-ppdc - 2.4.7-1.2ubuntu7.2 cups - 2.4.7-1.2ubuntu7.2 libcups2t64 - 2.4.7-1.2ubuntu7.2 cups-daemon - 2.4.7-1.2ubuntu7.2 No subscription required
None
https://launchpad.net/bugs/2070315
USN-6851-1 -- Netplan vulnerabilities
Ubuntu 24.04 LTS
Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.1 netplan-generator - 1.0-2ubuntu1.1 libnetplan1 - 1.0-2ubuntu1.1 python3-netplan - 1.0-2ubuntu1.1 libnetplan-dev - 1.0-2ubuntu1.1 No subscription required
Medium
CVE-2022-4968
https://launchpad.net/bugs/2066258
https://launchpad.net/bugs/1987842
https://launchpad.net/bugs/2065738
USN-6851-2 -- Netplan regression
Ubuntu 24.04 LTS
USN-6851-1 fixed vulnerabilities in Netplan. The update lead to the discovery of a regression in netplan which caused systemctl enable to fail on systems where systemd is not running. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.2 netplan-generator - 1.0-2ubuntu1.2 libnetplan1 - 1.0-2ubuntu1.2 python3-netplan - 1.0-2ubuntu1.2 libnetplan-dev - 1.0-2ubuntu1.2 No subscription required
None
https://launchpad.net/bugs/2071333
USN-6852-1 -- Wget vulnerability
Ubuntu 24.04 LTS
It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected. Update Instructions: Run `sudo pro fix USN-6852-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: wget - 1.21.4-1ubuntu4.1 No subscription required
Medium
CVE-2024-38428
USN-6855-1 -- libcdio vulnerability
Ubuntu 24.04 LTS
Mansour Gashasbi discovered that libcdio incorrectly handled certain memory operations when parsing an ISO file, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6855-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiso9660-dev - 2.1.0-4.1ubuntu1.2 libiso9660-11t64 - 2.1.0-4.1ubuntu1.2 libcdio-utils - 2.1.0-4.1ubuntu1.2 libcdio19t64 - 2.1.0-4.1ubuntu1.2 libiso9660++0t64 - 2.1.0-4.1ubuntu1.2 libudf-dev - 2.1.0-4.1ubuntu1.2 libcdio++1t64 - 2.1.0-4.1ubuntu1.2 libiso9660++-dev - 2.1.0-4.1ubuntu1.2 libudf0t64 - 2.1.0-4.1ubuntu1.2 libcdio++-dev - 2.1.0-4.1ubuntu1.2 libcdio-dev - 2.1.0-4.1ubuntu1.2 No subscription required
Medium
CVE-2024-36600
USN-6859-1 -- OpenSSH vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. Update Instructions: Run `sudo pro fix USN-6859-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.3 openssh-server - 1:9.6p1-3ubuntu13.3 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.3 ssh - 1:9.6p1-3ubuntu13.3 openssh-tests - 1:9.6p1-3ubuntu13.3 openssh-sftp-server - 1:9.6p1-3ubuntu13.3 No subscription required
High
CVE-2024-6387
USN-6860-1 -- OpenVPN vulnerabilities
Ubuntu 24.04 LTS
Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update Instructions: Run `sudo pro fix USN-6860-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.9-1ubuntu4.1 No subscription required
Medium
CVE-2024-28882
CVE-2024-5594
USN-6863-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6863-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-tools-6.8.0-1006 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-raspi - 6.8.0-1006.6 linux-tools-raspi - 6.8.0-1006.6 linux-tools-6.8.0-1006-raspi - 6.8.0-1006.6 linux-image-6.8.0-1006-raspi - 6.8.0-1006.6 linux-headers-raspi - 6.8.0-1006.6 linux-modules-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-headers-6.8.0-1006 - 6.8.0-1006.6 linux-raspi - 6.8.0-1006.6 linux-image-raspi - 6.8.0-1006.6 No subscription required linux-image-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-tools-6.8.0-1007 - 6.8.0-1007.7 linux-ibm-source-6.8.0 - 6.8.0-1007.7 linux-modules-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-ibm-lts-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-ibm - 6.8.0-1007.7 linux-modules-extra-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-ibm - 6.8.0-1007.7 linux-image-ibm-classic - 6.8.0-1007.7 linux-headers-ibm-lts-24.04 - 6.8.0-1007.7 linux-tools-ibm-classic - 6.8.0-1007.7 linux-tools-ibm - 6.8.0-1007.7 linux-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-classic - 6.8.0-1007.7 linux-modules-iwlwifi-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-ibm - 6.8.0-1007.7 linux-ibm-headers-6.8.0-1007 - 6.8.0-1007.7 linux-headers-ibm-classic - 6.8.0-1007.7 linux-ibm - 6.8.0-1007.7 linux-ibm-cloud-tools-common - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-classic - 6.8.0-1007.7 No subscription required linux-modules-extra-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-nvidia-64k - 6.8.0-1008.8 linux-nvidia-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-nvidia - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-nvidia-64k - 6.8.0-1008.8 linux-cloud-tools-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-nvidia-64k - 6.8.0-1008.8 linux-nvidia-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-nvidia - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1008.8 linux-nvidia - 6.8.0-1008.8 linux-nvidia-tools-host - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-headers-nvidia - 6.8.0-1008.8 linux-headers-nvidia-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 No subscription required linux-generic-hwe-24.04 - 6.8.0-36.36 linux-tools-common - 6.8.0-36.36 linux-modules-6.8.0-36-generic-64k - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-oem-20.04 - 6.8.0-36.36 linux-cloud-tools-virtual - 6.8.0-36.36 linux-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-generic-lpae - 6.8.0-36.36 linux-modules-iwlwifi-6.8.0-36-generic - 6.8.0-36.36 linux-image-6.8.0-36-generic - 6.8.0-36.36 linux-modules-6.8.0-36-generic - 6.8.0-36.36 linux-headers-laptop-23.10 - 6.8.0-36.36 linux-kvm - 6.8.0-36.36 linux-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-generic-64k - 6.8.0-36.36 linux-image-virtual - 6.8.0-36.36 linux-tools-oem-20.04b - 6.8.0-36.36 linux-doc - 6.8.0-36.36 linux-image-generic-64k - 6.8.0-36.36 linux-modules-usbio-generic - 6.8.0-36.36 linux-image-generic - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-image-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-image-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-oem-20.04 - 6.8.0-36.36 linux-tools-oem-20.04c - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic - 6.8.0-36.36 linux-crashdump - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04d - 6.8.0-36.36 linux-modules-iwlwifi-generic - 6.8.0-36.36 linux-modules-extra-6.8.0-36-generic - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-oem-22.04 - 6.8.0-36.36 linux-cloud-tools-6.8.0-36-generic - 6.8.0-36.36 linux-image-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-headers-kvm - 6.8.0-36.36 linux-tools-generic-lpae - 6.8.0-36.36 linux-cloud-tools-generic - 6.8.0-36.36 linux-virtual - 6.8.0-36.36 linux-tools-oem-22.04 - 6.8.0-36.36 linux-laptop-23.10 - 6.8.0-36.36 linux-tools-virtual - 6.8.0-36.36 linux-tools-generic - 6.8.0-36.36 linux-tools-6.8.0-36-generic-64k - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-usbio-6.8.0-36-generic - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-oem-20.04c - 6.8.0-36.36 linux-image-oem-20.04b - 6.8.0-36.36 linux-generic-lpae - 6.8.0-36.36 linux-tools-host - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic-64k - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04 - 6.8.0-36.36 linux-generic - 6.8.0-36.36 linux-image-oem-20.04 - 6.8.0-36.36 linux-oem-20.04d - 6.8.0-36.36 linux-headers-generic-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04c - 6.8.0-36.36 linux-image-oem-22.04 - 6.8.0-36.36 linux-image-uc-generic - 6.8.0-36.36 linux-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-lib-rust-6.8.0-36-generic - 6.8.0-36.36 linux-image-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-6.8.0-36 - 6.8.0-36.36 linux-modules-ipu6-6.8.0-36-generic - 6.8.0-36.36 linux-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-common - 6.8.0-36.36 linux-image-generic-lpae - 6.8.0-36.36 linux-image-6.8.0-36-generic-64k - 6.8.0-36.36 linux-oem-20.04b - 6.8.0-36.36 linux-source - 6.8.0-36.36 linux-image-extra-virtual - 6.8.0-36.36 linux-tools-6.8.0-36-generic - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-modules-ipu6-generic - 6.8.0-36.36 linux-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-image-laptop-23.10 - 6.8.0-36.36 linux-libc-dev - 6.8.0-36.36 linux-tools-6.8.0-36 - 6.8.0-36.36 linux-image-generic-hwe-24.04-edge - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04 - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-22.04 - 6.8.0-36.36 linux-headers-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic - 6.8.0-36.36 linux-cloud-tools-6.8.0-36 - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic-64k - 6.8.0-36.36 linux-tools-laptop-23.10 - 6.8.0-36.36 linux-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-virtual - 6.8.0-36.36 linux-image-kvm - 6.8.0-36.36 linux-source-6.8.0 - 6.8.0-36.36 linux-headers-oem-22.04 - 6.8.0-36.36 linux-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-tools-kvm - 6.8.0-36.36 linux-headers-oem-20.04b - 6.8.0-36.36 linux-headers-oem-20.04c - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic - 6.8.0-36.36 linux-headers-oem-20.04d - 6.8.0-36.36 linux-generic-64k - 6.8.0-36.36 linux-generic-64k-hwe-24.04 - 6.8.0-36.36 No subscription required linux-headers-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-modules-iwlwifi-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-common - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-common - 6.8.0-36.36.1 linux-tools-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-host - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-lowlatency-lib-rust-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-headers-6.8.0-36 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-tools-lowlatency-64k - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-cloud-tools-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-6.8.0-36 - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-6.8.0-36 - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency - 6.8.0-36.36.1 No subscription required
High
CVE-2024-26924
USN-6864-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-intel - 6.8.0-1006.13 linux-modules-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-intel - 6.8.0-1006.13 linux-intel - 6.8.0-1006.13 linux-intel-cloud-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-intel - 6.8.0-1006.13 linux-intel-headers-6.8.0-1006 - 6.8.0-1006.13 linux-image-intel - 6.8.0-1006.13 linux-modules-extra-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-extra-intel - 6.8.0-1006.13 linux-buildinfo-6.8.0-1006-intel - 6.8.0-1006.13 linux-cloud-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-unsigned-6.8.0-1006-intel - 6.8.0-1006.13 linux-intel-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-iwlwifi-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-6.8.0-1006-intel - 6.8.0-1006.13 No subscription required linux-gcp-headers-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-gcp - 6.8.0-1009.10 linux-tools-gcp - 6.8.0-1009.10 linux-gcp-tools-6.8.0-1009 - 6.8.0-1009.10 linux-modules-6.8.0-1009-gcp - 6.8.0-1009.10 linux-gcp - 6.8.0-1009.10 linux-image-unsigned-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-extra-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-gcp - 6.8.0-1009.10 linux-buildinfo-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-gcp - 6.8.0-1009.10 linux-modules-extra-gcp - 6.8.0-1009.10 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6864-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-oem-24.04a - 6.8.0-1007.7 linux-headers-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-usbio-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-oem-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-uc-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04 - 6.8.0-1007.7 linux-oem-6.8-headers-6.8.0-1007 - 6.8.0-1007.7 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1007.7 linux-image-uc-oem-24.04 - 6.8.0-1007.7 linux-image-oem-24.04a - 6.8.0-1007.7 linux-modules-usbio-oem-24.04 - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04a - 6.8.0-1007.7 linux-headers-oem-24.04a - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-6.8-tools-6.8.0-1007 - 6.8.0-1007.7 linux-modules-usbio-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04a - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-6.8.0-1007-oem - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04a - 6.8.0-1007.7 linux-image-uc-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04 - 6.8.0-1007.7 linux-tools-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04 - 6.8.0-1007.7 linux-headers-oem-24.04 - 6.8.0-1007.7 No subscription required linux-modules-extra-aws - 6.8.0-1010.10 linux-tools-aws - 6.8.0-1010.10 linux-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-headers-6.8.0-1010 - 6.8.0-1010.10 linux-headers-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-tools-6.8.0-1010 - 6.8.0-1010.10 linux-aws-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-6.8.0-1010-aws - 6.8.0-1010.10 linux-headers-aws - 6.8.0-1010.10 linux-image-aws - 6.8.0-1010.10 linux-aws - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-aws - 6.8.0-1010.10 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6864-3 -- Linux kernel (GKE) vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1005-gke - 6.8.0-1005.8 linux-gke - 6.8.0-1005.8 linux-gke-headers-6.8.0-1005 - 6.8.0-1005.8 linux-gke-tools-6.8.0-1005 - 6.8.0-1005.8 linux-headers-6.8.0-1005-gke - 6.8.0-1005.8 linux-headers-gke - 6.8.0-1005.8 linux-image-6.8.0-1005-gke - 6.8.0-1005.8 linux-image-gke - 6.8.0-1005.8 linux-image-unsigned-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-extra-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-gke - 6.8.0-1005.8 linux-tools-6.8.0-1005-gke - 6.8.0-1005.8 linux-tools-gke - 6.8.0-1005.8 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6875-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Netfilter; (CVE-2024-35901, CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6875-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-image-azure-fde - 6.8.0-1009.9 linux-azure-tools-6.8.0-1009 - 6.8.0-1009.9 linux-azure - 6.8.0-1009.9 linux-azure-headers-6.8.0-1009 - 6.8.0-1009.9 linux-modules-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-azure - 6.8.0-1009.9 linux-azure-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-azure - 6.8.0-1009.9 linux-tools-azure - 6.8.0-1009.9 linux-headers-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-azure - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-extra-azure - 6.8.0-1009.9 linux-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-6.8.0-1009-azure-fde - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-azure - 6.8.0-1009.9 linux-azure-fde - 6.8.0-1009.9 linux-image-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-azure - 6.8.0-1009.9 linux-headers-azure - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-azure - 6.8.0-1009.9 No subscription required
High
CVE-2024-21823
CVE-2024-26924
CVE-2024-35901
USN-6877-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
It was discovered that LibreOffice incorrectly performed TLS certificate verification when the LibreOfficeKit library is being used by third-party components. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6877-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.4-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.4-0ubuntu0.24.04.2 python3-access2base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.4-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.4-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.4-0ubuntu0.24.04.2 ure-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.4-0ubuntu0.24.04.2 libridl-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.4-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.4-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.4-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.4-0ubuntu0.24.04.2 libunoil-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.4-0ubuntu0.24.04.2 python3-uno - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.4-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.4-0ubuntu0.24.04.2 libjurt-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.4-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.4-0ubuntu0.24.04.2 ure - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.4-0ubuntu0.24.04.2 libjuh-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.4-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.4-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-5261
USN-6878-1 -- Linux kernel (Oracle) vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - PCI iomap interfaces; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-27032, CVE-2024-26868, CVE-2024-26879, CVE-2024-27033, CVE-2024-26943, CVE-2024-27040, CVE-2024-26950, CVE-2023-52650, CVE-2023-52649, CVE-2023-52644, CVE-2024-26899, CVE-2024-27432, CVE-2024-35806, CVE-2024-26871, CVE-2024-35845, CVE-2024-35799, CVE-2024-26945, CVE-2024-35805, CVE-2024-27041, CVE-2024-26860, CVE-2024-26930, CVE-2024-26941, CVE-2024-26960, CVE-2024-27034, CVE-2024-26891, CVE-2024-35793, CVE-2024-26963, CVE-2024-27029, CVE-2024-26890, CVE-2024-27074, CVE-2024-27079, CVE-2024-27053, CVE-2024-27070, CVE-2024-35821, CVE-2024-27067, CVE-2024-27051, CVE-2024-27026, CVE-2024-26961, CVE-2024-27050, CVE-2024-26939, CVE-2024-26897, CVE-2024-26878, CVE-2024-27433, CVE-2024-26885, CVE-2024-35810, CVE-2024-35829, CVE-2024-26965, CVE-2024-26875, CVE-2024-26966, CVE-2024-27078, CVE-2024-35874, CVE-2023-52661, CVE-2024-35794, CVE-2024-35787, CVE-2024-26874, CVE-2024-27054, CVE-2024-26940, CVE-2024-26859, CVE-2024-27044, CVE-2024-26948, CVE-2024-26882, CVE-2023-52653, CVE-2024-27071, CVE-2024-27065, CVE-2024-26877, CVE-2024-26929, CVE-2024-27064, CVE-2024-35803, CVE-2024-27066, CVE-2024-27028, CVE-2024-27072, CVE-2024-26876, CVE-2024-27039, CVE-2024-27435, CVE-2024-27434, CVE-2024-26812, CVE-2024-27030, CVE-2024-26816, CVE-2024-26873, CVE-2024-35808, CVE-2024-27389, CVE-2024-27075, CVE-2024-27038, CVE-2024-35828, CVE-2024-26946, CVE-2024-26655, CVE-2023-52662, CVE-2024-27077, CVE-2024-27076, CVE-2024-35795, CVE-2024-26933, CVE-2024-35789, CVE-2024-26972, CVE-2023-52663, CVE-2024-27031, CVE-2024-27069, CVE-2024-26813, CVE-2023-52659, CVE-2024-26862, CVE-2024-26962, CVE-2024-26654, CVE-2024-26815, CVE-2024-26978, CVE-2024-26976, CVE-2024-26893, CVE-2024-35809, CVE-2024-27027, CVE-2024-26864, CVE-2024-27048, CVE-2024-27046, CVE-2024-26869, CVE-2024-35827, CVE-2024-26951, CVE-2024-26942, CVE-2024-26870, CVE-2024-27437, CVE-2024-26931, CVE-2024-27036, CVE-2022-48669, CVE-2024-26898, CVE-2024-26970, CVE-2024-26886, CVE-2024-26944, CVE-2024-26865, CVE-2024-26896, CVE-2024-26895, CVE-2024-26947, CVE-2024-26880, CVE-2024-35811, CVE-2024-26975, CVE-2024-27391, CVE-2024-35796, CVE-2024-27043, CVE-2024-26949, CVE-2024-26653, CVE-2024-35814, CVE-2024-26964, CVE-2023-52652, CVE-2024-27047, CVE-2024-35830, CVE-2024-26900, CVE-2024-26810, CVE-2024-26956, CVE-2024-35817, CVE-2024-26887, CVE-2024-26809, CVE-2024-27045, CVE-2024-26656, CVE-2024-26971, CVE-2024-26866, CVE-2024-26861, CVE-2024-26968, CVE-2024-26881, CVE-2024-27063, CVE-2024-35807, CVE-2024-35797, CVE-2024-35822, CVE-2024-35813, CVE-2024-27073, CVE-2024-26954, CVE-2024-26888, CVE-2024-26955, CVE-2024-26894, CVE-2024-35844, CVE-2024-26958, CVE-2024-26952, CVE-2024-35798, CVE-2024-26969, CVE-2024-26967, CVE-2024-35800, CVE-2024-35819, CVE-2024-26937, CVE-2024-26927, CVE-2024-26883, CVE-2024-26934, CVE-2024-27392, CVE-2024-27068, CVE-2024-26889, CVE-2024-26892, CVE-2024-27390, CVE-2024-26657, CVE-2024-27388, CVE-2024-27049, CVE-2024-26935, CVE-2024-35831, CVE-2024-26884, CVE-2024-26938, CVE-2024-27037, CVE-2024-26977, CVE-2024-26953, CVE-2024-26973, CVE-2024-26932, CVE-2024-26901, CVE-2024-35843, CVE-2024-26872, CVE-2024-26959, CVE-2024-27035, CVE-2024-35826, CVE-2024-27436, CVE-2024-26651, CVE-2024-26957, CVE-2024-26863, CVE-2024-27042, CVE-2024-26814, CVE-2023-52647, CVE-2024-27080, CVE-2024-27052, CVE-2024-27058, CVE-2024-35801, CVE-2023-52648) Update Instructions: Run `sudo pro fix USN-6878-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-extra-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-oracle - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle - 6.8.0-1006.6 linux-image-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle-64k - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-64k - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle-64k - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle - 6.8.0-1006.6 linux-modules-extra-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-oracle - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle - 6.8.0-1006.6 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-21823
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities
Ubuntu 24.04 LTS
Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31620, CVE-2023-31622, CVE-2023-31624, CVE-2023-31626, CVE-2023-31627, CVE-2023-31629, CVE-2023-31630, CVE-2023-31631, CVE-2023-48951) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-48945, CVE-2023-48946, CVE-2023-48947, CVE-2023-48950) Update Instructions: Run `sudo pro fix USN-6879-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-31620
CVE-2023-31622
CVE-2023-31624
CVE-2023-31626
CVE-2023-31627
CVE-2023-31629
CVE-2023-31630
CVE-2023-31631
CVE-2023-48945
CVE-2023-48946
CVE-2023-48947
CVE-2023-48950
CVE-2023-48951
USN-6882-1 -- Cinder vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.2 cinder-backup - 2:24.0.0-0ubuntu1.2 cinder-common - 2:24.0.0-0ubuntu1.2 cinder-scheduler - 2:24.0.0-0ubuntu1.2 cinder-volume - 2:24.0.0-0ubuntu1.2 python3-cinder - 2:24.0.0-0ubuntu1.2 No subscription required
Medium
CVE-2024-32498
USN-6882-2 -- Cinder regression
Ubuntu 24.04 LTS
USN-6882-1 fixed vulnerabilities in Cinder. The update caused a regression in certain environments due to incorrect privilege handling. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.3 cinder-backup - 2:24.0.0-0ubuntu1.3 cinder-common - 2:24.0.0-0ubuntu1.3 cinder-scheduler - 2:24.0.0-0ubuntu1.3 cinder-volume - 2:24.0.0-0ubuntu1.3 python3-cinder - 2:24.0.0-0ubuntu1.3 No subscription required
Medium
CVE-2022-47951
CVE-2024-32498
USN-6883-1 -- OpenStack Glance vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Glance incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6883-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glance - 2:28.0.1-0ubuntu1.2 glance-api - 2:28.0.1-0ubuntu1.2 glance-common - 2:28.0.1-0ubuntu1.2 python-glance-doc - 2:28.0.1-0ubuntu1.2 python3-glance - 2:28.0.1-0ubuntu1.2 No subscription required
Medium
CVE-2024-32498
USN-6884-1 -- Nova vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Nova incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6884-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.3 nova-api - 3:29.0.1-0ubuntu1.3 nova-api-metadata - 3:29.0.1-0ubuntu1.3 nova-api-os-compute - 3:29.0.1-0ubuntu1.3 nova-api-os-volume - 3:29.0.1-0ubuntu1.3 nova-cells - 3:29.0.1-0ubuntu1.3 nova-common - 3:29.0.1-0ubuntu1.3 nova-compute - 3:29.0.1-0ubuntu1.3 nova-compute-ironic - 3:29.0.1-0ubuntu1.3 nova-compute-kvm - 3:29.0.1-0ubuntu1.3 nova-compute-libvirt - 3:29.0.1-0ubuntu1.3 nova-compute-lxc - 3:29.0.1-0ubuntu1.3 nova-compute-qemu - 3:29.0.1-0ubuntu1.3 nova-compute-vmware - 3:29.0.1-0ubuntu1.3 nova-compute-xen - 3:29.0.1-0ubuntu1.3 nova-conductor - 3:29.0.1-0ubuntu1.3 nova-doc - 3:29.0.1-0ubuntu1.3 nova-novncproxy - 3:29.0.1-0ubuntu1.3 nova-scheduler - 3:29.0.1-0ubuntu1.3 nova-serialproxy - 3:29.0.1-0ubuntu1.3 nova-spiceproxy - 3:29.0.1-0ubuntu1.3 nova-volume - 3:29.0.1-0ubuntu1.3 python3-nova - 3:29.0.1-0ubuntu1.3 No subscription required
Medium
CVE-2024-32498
USN-6885-1 -- Apache HTTP Server vulnerabilities
Ubuntu 24.04 LTS
Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.2 apache2-bin - 2.4.58-1ubuntu8.2 apache2-data - 2.4.58-1ubuntu8.2 apache2-dev - 2.4.58-1ubuntu8.2 apache2-doc - 2.4.58-1ubuntu8.2 apache2-ssl-dev - 2.4.58-1ubuntu8.2 apache2-suexec-custom - 2.4.58-1ubuntu8.2 apache2-suexec-pristine - 2.4.58-1ubuntu8.2 apache2-utils - 2.4.58-1ubuntu8.2 libapache2-mod-md - 2.4.58-1ubuntu8.2 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.2 No subscription required
High
CVE-2024-36387
CVE-2024-38473
CVE-2024-38474
CVE-2024-38475
CVE-2024-38476
CVE-2024-38477
CVE-2024-39573
CVE-2024-39884
USN-6885-2 -- Apache HTTP Server regression
Ubuntu 24.04 LTS
USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.3 apache2-bin - 2.4.58-1ubuntu8.3 apache2-data - 2.4.58-1ubuntu8.3 apache2-dev - 2.4.58-1ubuntu8.3 apache2-doc - 2.4.58-1ubuntu8.3 apache2-ssl-dev - 2.4.58-1ubuntu8.3 apache2-suexec-custom - 2.4.58-1ubuntu8.3 apache2-suexec-pristine - 2.4.58-1ubuntu8.3 apache2-utils - 2.4.58-1ubuntu8.3 libapache2-mod-md - 2.4.58-1ubuntu8.3 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.3 No subscription required
None
https://launchpad.net/bugs/2072648
USN-6885-4 -- Apache HTTP Server regression
Ubuntu 24.04 LTS
USN-6885-1 fixed a vulnerability in Apache. The patch for CVE-2024-38474 was incomplete and caused regressions. This update provides the fix for that issue. Original advisory details: Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474) Update Instructions: Run `sudo pro fix USN-6885-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.6 apache2-bin - 2.4.58-1ubuntu8.6 apache2-data - 2.4.58-1ubuntu8.6 apache2-dev - 2.4.58-1ubuntu8.6 apache2-doc - 2.4.58-1ubuntu8.6 apache2-ssl-dev - 2.4.58-1ubuntu8.6 apache2-suexec-custom - 2.4.58-1ubuntu8.6 apache2-suexec-pristine - 2.4.58-1ubuntu8.6 apache2-utils - 2.4.58-1ubuntu8.6 libapache2-mod-md - 2.4.58-1ubuntu8.6 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.6 No subscription required
None
https://launchpad.net/bugs/2103723
USN-6886-1 -- Go vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Go net/http module did not properly handle the requests when request\'s headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45288) It was discovered that the Go net/http module did not properly validate the subdomain match or exact match of the initial domain. An attacker could possibly use this issue to read sensitive information. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45289) It was discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45290) It was discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24783) It was discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24784) It was discovered that the Go html/template module did not validate errors returned from MarshalJSON methods. An attacker could possibly use this issue to inject arbitrary code into the Go template. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24785) It was discovered that the Go net module did not properly validate the DNS message in response to a query. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.22. (CVE-2024-24788) It was discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) It was discovered that the Go net/netip module did not work as expected for IPv4-mapped IPv6 addresses in various Is methods. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24790) Update Instructions: Run `sudo pro fix USN-6886-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.21 - 1.21.9-1ubuntu0.1 golang-1.21-doc - 1.21.9-1ubuntu0.1 golang-1.21-go - 1.21.9-1ubuntu0.1 golang-1.21-src - 1.21.9-1ubuntu0.1 No subscription required golang-1.22 - 1.22.2-2ubuntu0.1 golang-1.22-doc - 1.22.2-2ubuntu0.1 golang-1.22-go - 1.22.2-2ubuntu0.1 golang-1.22-src - 1.22.2-2ubuntu0.1 No subscription required
Medium
CVE-2023-45288
CVE-2023-45289
CVE-2023-45290
CVE-2024-24783
CVE-2024-24784
CVE-2024-24785
CVE-2024-24788
CVE-2024-24789
CVE-2024-24790
USN-6887-1 -- OpenSSH vulnerability
Ubuntu 24.04 LTS
Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker could possibly use this issue to determine timing information about keystrokes. Update Instructions: Run `sudo pro fix USN-6887-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.4 openssh-server - 1:9.6p1-3ubuntu13.4 openssh-sftp-server - 1:9.6p1-3ubuntu13.4 openssh-tests - 1:9.6p1-3ubuntu13.4 ssh - 1:9.6p1-3ubuntu13.4 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.4 No subscription required
Medium
CVE-2024-39894
USN-6888-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary directories. (CVE-2024-39330) It was discovered that Django incorrectly handled certain long strings that included a specific set of characters. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-39614) Update Instructions: Run `sudo pro fix USN-6888-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.1 python3-django - 3:4.2.11-1ubuntu1.1 No subscription required
Medium
CVE-2024-38875
CVE-2024-39329
CVE-2024-39330
CVE-2024-39614
USN-6889-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-30105) Radek Zikmund discovered that .NET did not properly manage memory. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-35264) It was discovered that .NET did not properly parse X.509 Content and ObjectIdentifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38095) Update Instructions: Run `sudo pro fix USN-6889-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.107-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.107-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.107-8.0.7-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-30105
CVE-2024-35264
CVE-2024-38095
USN-6893-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008, CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946, CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942, CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934, CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976, CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929, CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986, CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965, CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892, CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865, CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027, CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875, CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903, CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025, CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864, CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968, CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019, CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916, CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002, CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011, CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910, CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010, CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894, CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007, CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960, CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001, CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979, CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926, CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920, CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911, CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982, CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919, CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914, CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939, CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811, CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945, CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921, CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893, CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954, CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014, CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927, CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017, CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869, CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974) Update Instructions: Run `sudo pro fix USN-6893-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-intel - 6.8.0-1007.14 linux-cloud-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-intel - 6.8.0-1007.14 linux-image-6.8.0-1007-intel - 6.8.0-1007.14 linux-image-intel - 6.8.0-1007.14 linux-image-unsigned-6.8.0-1007-intel - 6.8.0-1007.14 linux-intel - 6.8.0-1007.14 linux-intel-cloud-tools-6.8.0-1007 - 6.8.0-1007.14 linux-intel-headers-6.8.0-1007 - 6.8.0-1007.14 linux-intel-tools-6.8.0-1007 - 6.8.0-1007.14 linux-modules-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-intel - 6.8.0-1007.14 linux-modules-iwlwifi-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-iwlwifi-intel - 6.8.0-1007.14 linux-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-tools-intel - 6.8.0-1007.14 No subscription required linux-buildinfo-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-raspi - 6.8.0-1007.7 linux-image-6.8.0-1007-raspi - 6.8.0-1007.7 linux-image-raspi - 6.8.0-1007.7 linux-modules-6.8.0-1007-raspi - 6.8.0-1007.7 linux-raspi - 6.8.0-1007.7 linux-raspi-headers-6.8.0-1007 - 6.8.0-1007.7 linux-raspi-tools-6.8.0-1007 - 6.8.0-1007.7 linux-tools-6.8.0-1007-raspi - 6.8.0-1007.7 linux-tools-raspi - 6.8.0-1007.7 No subscription required linux-buildinfo-6.8.0-1008-ibm - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-6.8.0-1008-ibm - 6.8.0-1008.8 linux-headers-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-ibm - 6.8.0-1008.8 linux-headers-ibm-classic - 6.8.0-1008.8 linux-headers-ibm-lts-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04a - 6.8.0-1008.8 linux-ibm - 6.8.0-1008.8 linux-ibm-classic - 6.8.0-1008.8 linux-ibm-cloud-tools-common - 6.8.0-1008.8 linux-ibm-headers-6.8.0-1008 - 6.8.0-1008.8 linux-ibm-lts-24.04 - 6.8.0-1008.8 linux-ibm-source-6.8.0 - 6.8.0-1008.8 linux-ibm-tools-6.8.0-1008 - 6.8.0-1008.8 linux-image-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-ibm - 6.8.0-1008.8 linux-image-ibm-classic - 6.8.0-1008.8 linux-image-ibm-lts-24.04 - 6.8.0-1008.8 linux-image-oem-24.04 - 6.8.0-1008.8 linux-image-oem-24.04a - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-uc-oem-24.04 - 6.8.0-1008.8 linux-image-uc-oem-24.04a - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-ipu6-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04 - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04a - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-iwlwifi-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-classic - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1008.8 linux-modules-usbio-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-usbio-oem-24.04 - 6.8.0-1008.8 linux-modules-usbio-oem-24.04a - 6.8.0-1008.8 linux-oem-24.04 - 6.8.0-1008.8 linux-oem-24.04a - 6.8.0-1008.8 linux-oem-6.8-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oem-6.8-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-ibm - 6.8.0-1008.8 linux-tools-6.8.0-1008-oem - 6.8.0-1008.8 linux-tools-ibm - 6.8.0-1008.8 linux-tools-ibm-classic - 6.8.0-1008.8 linux-tools-ibm-lts-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04a - 6.8.0-1008.8 No subscription required linux-azure - 6.8.0-1010.10 linux-azure-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-azure-fde - 6.8.0-1010.10 linux-azure-headers-6.8.0-1010 - 6.8.0-1010.10 linux-azure-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-azure - 6.8.0-1010.10 linux-headers-6.8.0-1010-azure - 6.8.0-1010.10 linux-headers-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure-fde - 6.8.0-1010.10 linux-image-azure - 6.8.0-1010.10 linux-image-azure-fde - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-azure - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-iwlwifi-azure - 6.8.0-1010.10 linux-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-tools-azure - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1010-gcp - 6.8.0-1010.11 linux-gcp - 6.8.0-1010.11 linux-gcp-headers-6.8.0-1010 - 6.8.0-1010.11 linux-gcp-tools-6.8.0-1010 - 6.8.0-1010.11 linux-headers-6.8.0-1010-gcp - 6.8.0-1010.11 linux-headers-gcp - 6.8.0-1010.11 linux-image-6.8.0-1010-gcp - 6.8.0-1010.11 linux-image-gcp - 6.8.0-1010.11 linux-image-unsigned-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-gcp - 6.8.0-1010.11 linux-tools-6.8.0-1010-gcp - 6.8.0-1010.11 linux-tools-gcp - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-38-generic - 6.8.0-38.38 linux-buildinfo-6.8.0-38-generic-64k - 6.8.0-38.38 linux-cloud-tools-6.8.0-38 - 6.8.0-38.38 linux-cloud-tools-6.8.0-38-generic - 6.8.0-38.38 linux-cloud-tools-common - 6.8.0-38.38 linux-cloud-tools-generic - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-cloud-tools-virtual - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-crashdump - 6.8.0-38.38 linux-doc - 6.8.0-38.38 linux-generic - 6.8.0-38.38 linux-generic-64k - 6.8.0-38.38 linux-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-generic-hwe-24.04 - 6.8.0-38.38 linux-generic-hwe-24.04-edge - 6.8.0-38.38 linux-generic-lpae - 6.8.0-38.38 linux-headers-6.8.0-38 - 6.8.0-38.38 linux-headers-6.8.0-38-generic - 6.8.0-38.38 linux-headers-6.8.0-38-generic-64k - 6.8.0-38.38 linux-headers-generic - 6.8.0-38.38 linux-headers-generic-64k - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-lpae - 6.8.0-38.38 linux-headers-kvm - 6.8.0-38.38 linux-headers-laptop-23.10 - 6.8.0-38.38 linux-headers-oem-20.04 - 6.8.0-38.38 linux-headers-oem-20.04b - 6.8.0-38.38 linux-headers-oem-20.04c - 6.8.0-38.38 linux-headers-oem-20.04d - 6.8.0-38.38 linux-headers-oem-22.04 - 6.8.0-38.38 linux-headers-virtual - 6.8.0-38.38 linux-headers-virtual-hwe-24.04 - 6.8.0-38.38 linux-headers-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-6.8.0-38-generic - 6.8.0-38.38 linux-image-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-extra-virtual - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic - 6.8.0-38.38 linux-image-generic-64k - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-hwe-24.04 - 6.8.0-38.38 linux-image-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-lpae - 6.8.0-38.38 linux-image-kvm - 6.8.0-38.38 linux-image-laptop-23.10 - 6.8.0-38.38 linux-image-oem-20.04 - 6.8.0-38.38 linux-image-oem-20.04b - 6.8.0-38.38 linux-image-oem-20.04c - 6.8.0-38.38 linux-image-oem-20.04d - 6.8.0-38.38 linux-image-oem-22.04 - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-uc-generic - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04 - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-virtual - 6.8.0-38.38 linux-image-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-kvm - 6.8.0-38.38 linux-laptop-23.10 - 6.8.0-38.38 linux-lib-rust-6.8.0-38-generic - 6.8.0-38.38 linux-libc-dev - 6.8.0-38.38 linux-modules-6.8.0-38-generic - 6.8.0-38.38 linux-modules-6.8.0-38-generic-64k - 6.8.0-38.38 linux-modules-extra-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-generic - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-6.8.0-38-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04 - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04d - 6.8.0-38.38 linux-modules-iwlwifi-oem-22.04 - 6.8.0-38.38 linux-modules-usbio-6.8.0-38-generic - 6.8.0-38.38 linux-modules-usbio-generic - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-38.38 linux-oem-20.04 - 6.8.0-38.38 linux-oem-20.04b - 6.8.0-38.38 linux-oem-20.04c - 6.8.0-38.38 linux-oem-20.04d - 6.8.0-38.38 linux-oem-22.04 - 6.8.0-38.38 linux-source - 6.8.0-38.38 linux-source-6.8.0 - 6.8.0-38.38 linux-tools-6.8.0-38 - 6.8.0-38.38 linux-tools-6.8.0-38-generic - 6.8.0-38.38 linux-tools-6.8.0-38-generic-64k - 6.8.0-38.38 linux-tools-common - 6.8.0-38.38 linux-tools-generic - 6.8.0-38.38 linux-tools-generic-64k - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-lpae - 6.8.0-38.38 linux-tools-host - 6.8.0-38.38 linux-tools-kvm - 6.8.0-38.38 linux-tools-laptop-23.10 - 6.8.0-38.38 linux-tools-oem-20.04 - 6.8.0-38.38 linux-tools-oem-20.04b - 6.8.0-38.38 linux-tools-oem-20.04c - 6.8.0-38.38 linux-tools-oem-20.04d - 6.8.0-38.38 linux-tools-oem-22.04 - 6.8.0-38.38 linux-tools-virtual - 6.8.0-38.38 linux-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-virtual - 6.8.0-38.38 linux-virtual-hwe-24.04 - 6.8.0-38.38 linux-virtual-hwe-24.04-edge - 6.8.0-38.38 No subscription required linux-buildinfo-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-buildinfo-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-cloud-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency - 6.8.0-38.38.1 linux-headers-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency - 6.8.0-38.38.1 linux-image-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency - 6.8.0-38.38.1 linux-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-common - 6.8.0-38.38.1 linux-lowlatency-headers-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-lib-rust-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-lowlatency-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-tools-common - 6.8.0-38.38.1 linux-lowlatency-tools-host - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-modules-iwlwifi-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency - 6.8.0-38.38.1 linux-tools-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6893-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961, CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939, CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896, CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015, CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922, CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007, CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914, CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915, CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867, CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022, CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024, CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912, CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866, CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936, CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018, CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870, CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878, CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014, CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983, CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008, CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973, CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026, CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953, CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971, CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937, CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981, CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952, CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880, CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871, CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017) Update Instructions: Run `sudo pro fix USN-6893-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gke - 6.8.0-1006.9 linux-gke - 6.8.0-1006.9 linux-gke-headers-6.8.0-1006 - 6.8.0-1006.9 linux-gke-tools-6.8.0-1006 - 6.8.0-1006.9 linux-headers-6.8.0-1006-gke - 6.8.0-1006.9 linux-headers-gke - 6.8.0-1006.9 linux-image-6.8.0-1006-gke - 6.8.0-1006.9 linux-image-gke - 6.8.0-1006.9 linux-image-unsigned-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-extra-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-gke - 6.8.0-1006.9 linux-tools-6.8.0-1006-gke - 6.8.0-1006.9 linux-tools-gke - 6.8.0-1006.9 No subscription required linux-buildinfo-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-cloud-tools-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-headers-nvidia - 6.8.0-1009.9 linux-headers-nvidia-64k - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-nvidia - 6.8.0-1009.9 linux-image-nvidia-64k - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1009.9 linux-nvidia - 6.8.0-1009.9 linux-nvidia-64k - 6.8.0-1009.9 linux-nvidia-headers-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-host - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-tools-nvidia - 6.8.0-1009.9 linux-tools-nvidia-64k - 6.8.0-1009.9 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6893-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966) Update Instructions: Run `sudo pro fix USN-6893-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1011.12 linux-aws-cloud-tools-6.8.0-1011 - 6.8.0-1011.12 linux-aws-headers-6.8.0-1011 - 6.8.0-1011.12 linux-aws-tools-6.8.0-1011 - 6.8.0-1011.12 linux-buildinfo-6.8.0-1011-aws - 6.8.0-1011.12 linux-cloud-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-aws - 6.8.0-1011.12 linux-image-6.8.0-1011-aws - 6.8.0-1011.12 linux-image-aws - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-aws - 6.8.0-1011.12 linux-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-tools-aws - 6.8.0-1011.12 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6897-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript incorrectly handled certain long PDF filter names. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506) It was discovered that Ghostscript incorrectly handled certain API parameters. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29507) It was discovered that Ghostscript incorrectly handled certain BaseFont names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-29508) It was discovered that Ghostscript incorrectly handled certain PDF passwords that contained NULL bytes. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29509) It was discovered that Ghostscript incorrectly handled certain certain file paths when doing OCR. An attacker could use this issue to read arbitrary files and write error messages to arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511) Update Instructions: Run `sudo pro fix USN-6897-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.3 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.3 libgs-common - 10.02.1~dfsg1-0ubuntu7.3 libgs-dev - 10.02.1~dfsg1-0ubuntu7.3 libgs10 - 10.02.1~dfsg1-0ubuntu7.3 libgs10-common - 10.02.1~dfsg1-0ubuntu7.3 No subscription required
Medium
CVE-2024-29506
CVE-2024-29507
CVE-2024-29508
CVE-2024-29509
CVE-2024-29511
USN-6899-1 -- GTK vulnerability
Ubuntu 24.04 LTS
It was discovered that GTK would attempt to load modules from the current directory, contrary to expectations. If users started GTK applications from shared directories, a local attacker could use this issue to execute arbitrary code, and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6899-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gtk-2.0 - 2.24.33-4ubuntu1.1 gtk2-engines-pixbuf - 2.24.33-4ubuntu1.1 libgail-common - 2.24.33-4ubuntu1.1 libgail-dev - 2.24.33-4ubuntu1.1 libgail-doc - 2.24.33-4ubuntu1.1 libgail18t64 - 2.24.33-4ubuntu1.1 libgtk2.0-0t64 - 2.24.33-4ubuntu1.1 libgtk2.0-bin - 2.24.33-4ubuntu1.1 libgtk2.0-common - 2.24.33-4ubuntu1.1 libgtk2.0-dev - 2.24.33-4ubuntu1.1 libgtk2.0-doc - 2.24.33-4ubuntu1.1 No subscription required gir1.2-gtk-3.0 - 3.24.41-4ubuntu1.1 gtk-3-examples - 3.24.41-4ubuntu1.1 gtk-update-icon-cache - 3.24.41-4ubuntu1.1 libgail-3-0t64 - 3.24.41-4ubuntu1.1 libgail-3-dev - 3.24.41-4ubuntu1.1 libgail-3-doc - 3.24.41-4ubuntu1.1 libgtk-3-0t64 - 3.24.41-4ubuntu1.1 libgtk-3-bin - 3.24.41-4ubuntu1.1 libgtk-3-common - 3.24.41-4ubuntu1.1 libgtk-3-dev - 3.24.41-4ubuntu1.1 libgtk-3-doc - 3.24.41-4ubuntu1.1 No subscription required
Medium
CVE-2024-6655
USN-6902-1 -- Apache HTTP Server vulnerability
Ubuntu 24.04 LTS
It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update Instructions: Run `sudo pro fix USN-6902-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.4 apache2-bin - 2.4.58-1ubuntu8.4 apache2-data - 2.4.58-1ubuntu8.4 apache2-dev - 2.4.58-1ubuntu8.4 apache2-doc - 2.4.58-1ubuntu8.4 apache2-ssl-dev - 2.4.58-1ubuntu8.4 apache2-suexec-custom - 2.4.58-1ubuntu8.4 apache2-suexec-pristine - 2.4.58-1ubuntu8.4 apache2-utils - 2.4.58-1ubuntu8.4 libapache2-mod-md - 2.4.58-1ubuntu8.4 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.4 No subscription required
Medium
CVE-2024-40725
USN-6904-1 -- PyMongo vulnerability
Ubuntu 24.04 LTS
It was discovered that PyMongo incorrectly handled certain BSON. An attacker could possibly use this issue to read sensitive information or cause a crash. Update Instructions: Run `sudo pro fix USN-6904-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pymongo-doc - 3.11.0-1ubuntu0.24.04.1 python3-bson - 3.11.0-1ubuntu0.24.04.1 python3-bson-ext - 3.11.0-1ubuntu0.24.04.1 python3-gridfs - 3.11.0-1ubuntu0.24.04.1 python3-pymongo - 3.11.0-1ubuntu0.24.04.1 python3-pymongo-ext - 3.11.0-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5629
USN-6906-1 -- python-zipp vulnerability
Ubuntu 24.04 LTS
It was discovered that python-zipp did not properly handle the zip files with malformed names. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6906-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-zipp - 1.0.0-6ubuntu0.1 No subscription required
Medium
CVE-2024-5569
USN-6907-1 -- Squid vulnerability
Ubuntu 24.04 LTS
Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue to cause a memory corruption error, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6907-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.6-1ubuntu5.1 squid-cgi - 6.6-1ubuntu5.1 squid-common - 6.6-1ubuntu5.1 squid-openssl - 6.6-1ubuntu5.1 squid-purge - 6.6-1ubuntu5.1 squidclient - 6.6-1ubuntu5.1 No subscription required
Medium
CVE-2024-37894
USN-6909-1 -- Bind vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind to become unstable, resulting in a denial of service. (CVE-2024-0760) Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very large number of RRs existing at the same time. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1737) It was discovered that Bind incorrectly handled a large number of SIG(0) signed requests. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1975) Daniel Stränger discovered that Bind incorrectly handled serving both stable cache data and authoritative zone content. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2024-4076) On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918 Update Instructions: Run `sudo pro fix USN-6909-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.28-0ubuntu0.24.04.1 bind9-dev - 1:9.18.28-0ubuntu0.24.04.1 bind9-dnsutils - 1:9.18.28-0ubuntu0.24.04.1 bind9-doc - 1:9.18.28-0ubuntu0.24.04.1 bind9-host - 1:9.18.28-0ubuntu0.24.04.1 bind9-libs - 1:9.18.28-0ubuntu0.24.04.1 bind9-utils - 1:9.18.28-0ubuntu0.24.04.1 bind9utils - 1:9.18.28-0ubuntu0.24.04.1 dnsutils - 1:9.18.28-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-0760
CVE-2024-1737
CVE-2024-1975
CVE-2024-4076
USN-6911-1 -- Nova vulnerability
Ubuntu 24.04 LTS
Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6911-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.4 nova-api - 3:29.0.1-0ubuntu1.4 nova-api-metadata - 3:29.0.1-0ubuntu1.4 nova-api-os-compute - 3:29.0.1-0ubuntu1.4 nova-api-os-volume - 3:29.0.1-0ubuntu1.4 nova-cells - 3:29.0.1-0ubuntu1.4 nova-common - 3:29.0.1-0ubuntu1.4 nova-compute - 3:29.0.1-0ubuntu1.4 nova-compute-ironic - 3:29.0.1-0ubuntu1.4 nova-compute-kvm - 3:29.0.1-0ubuntu1.4 nova-compute-libvirt - 3:29.0.1-0ubuntu1.4 nova-compute-lxc - 3:29.0.1-0ubuntu1.4 nova-compute-qemu - 3:29.0.1-0ubuntu1.4 nova-compute-vmware - 3:29.0.1-0ubuntu1.4 nova-compute-xen - 3:29.0.1-0ubuntu1.4 nova-conductor - 3:29.0.1-0ubuntu1.4 nova-doc - 3:29.0.1-0ubuntu1.4 nova-novncproxy - 3:29.0.1-0ubuntu1.4 nova-scheduler - 3:29.0.1-0ubuntu1.4 nova-serialproxy - 3:29.0.1-0ubuntu1.4 nova-spiceproxy - 3:29.0.1-0ubuntu1.4 nova-volume - 3:29.0.1-0ubuntu1.4 python3-nova - 3:29.0.1-0ubuntu1.4 No subscription required
Medium
CVE-2024-40767
USN-6912-1 -- provd vulnerability
Ubuntu 24.04 LTS
James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. Update Instructions: Run `sudo pro fix USN-6912-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: provd - 0.1.2+24.04 No subscription required
Medium
CVE-2024-6714
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574
USN-6915-1 -- poppler vulnerability
Ubuntu 24.04 LTS
It was discovered that poppler incorrectly handled certain malformed PDF. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6915-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.1 libpoppler-cpp-dev - 24.02.0-1ubuntu9.1 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.1 libpoppler-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-doc - 24.02.0-1ubuntu9.1 libpoppler-glib8t64 - 24.02.0-1ubuntu9.1 libpoppler-private-dev - 24.02.0-1ubuntu9.1 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.1 libpoppler-qt5-dev - 24.02.0-1ubuntu9.1 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.1 libpoppler-qt6-dev - 24.02.0-1ubuntu9.1 libpoppler134 - 24.02.0-1ubuntu9.1 poppler-utils - 24.02.0-1ubuntu9.1 No subscription required
Low
CVE-2024-6239
USN-6918-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, CVE-2024-35894, CVE-2024-26983, CVE-2024-35966, CVE-2024-35967, CVE-2024-35945, CVE-2024-27003, CVE-2024-35939, CVE-2024-35861, CVE-2024-26985, CVE-2024-27015, CVE-2024-35982, CVE-2024-35912, CVE-2024-35979, CVE-2024-35879, CVE-2024-26982, CVE-2024-35891, CVE-2024-35925, CVE-2024-35870, CVE-2024-27021, CVE-2024-35866, CVE-2024-27014, CVE-2024-27001, CVE-2024-27004, CVE-2024-35953, CVE-2024-36021, CVE-2024-35931, CVE-2024-27007, CVE-2024-35922, CVE-2024-35872, CVE-2024-35926, CVE-2024-27016, CVE-2024-26984, CVE-2024-35919, CVE-2024-35911, CVE-2024-26923, CVE-2024-35929, CVE-2024-35887, CVE-2024-35893, CVE-2024-35898, CVE-2024-35930, CVE-2024-35934, CVE-2024-35916, CVE-2024-35877, CVE-2024-26926, CVE-2024-35974, CVE-2024-36018, CVE-2024-27002, CVE-2024-35975, CVE-2024-35864, CVE-2024-35958, CVE-2024-35944, CVE-2024-35985, CVE-2024-35940, CVE-2024-35900, CVE-2024-27018, CVE-2024-26936, CVE-2024-36024, CVE-2024-26998, CVE-2024-35954, CVE-2024-35878, CVE-2024-26928, CVE-2024-35952, CVE-2024-36020, CVE-2024-26986, CVE-2024-35950, CVE-2024-35957, CVE-2024-35909, CVE-2024-27005, CVE-2024-35978, CVE-2024-35875, CVE-2024-35943, CVE-2024-35970, CVE-2024-35863, CVE-2024-26993, CVE-2024-35865, CVE-2024-26995, CVE-2024-35888, CVE-2024-35899, CVE-2024-35868, CVE-2023-52699, CVE-2024-26994, CVE-2024-26817, CVE-2024-35902, CVE-2024-35977, CVE-2024-35961, CVE-2024-36025, CVE-2024-35936, CVE-2024-35913, CVE-2024-27017, CVE-2024-35889, CVE-2024-35972, CVE-2024-35901, CVE-2024-26921, CVE-2024-26924, CVE-2024-35951, CVE-2024-35860, CVE-2024-35907, CVE-2024-35910, CVE-2024-36022, CVE-2024-27019, CVE-2024-27009, CVE-2024-26981, CVE-2024-35973, CVE-2024-35965, CVE-2024-36019, CVE-2024-35871, CVE-2024-27008, CVE-2024-26811, CVE-2024-35908, CVE-2024-35921, CVE-2024-35942, CVE-2024-35946, CVE-2024-35924, CVE-2024-27011, CVE-2024-35960, CVE-2024-27006, CVE-2024-35937, CVE-2024-35932) Update Instructions: Run `sudo pro fix USN-6918-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-oracle - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-oracle - 6.8.0-1008.8 linux-headers-oracle-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-image-oracle - 6.8.0-1008.8 linux-image-oracle-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-iwlwifi-oracle - 6.8.0-1008.8 linux-oracle - 6.8.0-1008.8 linux-oracle-64k - 6.8.0-1008.8 linux-oracle-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oracle-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-tools-oracle - 6.8.0-1008.8 linux-tools-oracle-64k - 6.8.0-1008.8 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26924
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6921-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984, CVE-2024-36008, CVE-2024-36016) Update Instructions: Run `sudo pro fix USN-6921-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gke - 6.8.0-1007.10 linux-gke - 6.8.0-1007.10 linux-gke-headers-6.8.0-1007 - 6.8.0-1007.10 linux-gke-tools-6.8.0-1007 - 6.8.0-1007.10 linux-headers-6.8.0-1007-gke - 6.8.0-1007.10 linux-headers-gke - 6.8.0-1007.10 linux-image-6.8.0-1007-gke - 6.8.0-1007.10 linux-image-gke - 6.8.0-1007.10 linux-image-unsigned-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-extra-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-gke - 6.8.0-1007.10 linux-tools-6.8.0-1007-gke - 6.8.0-1007.10 linux-tools-gke - 6.8.0-1007.10 No subscription required linux-buildinfo-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-raspi - 6.8.0-1008.8 linux-image-6.8.0-1008-raspi - 6.8.0-1008.8 linux-image-raspi - 6.8.0-1008.8 linux-modules-6.8.0-1008-raspi - 6.8.0-1008.8 linux-raspi - 6.8.0-1008.8 linux-raspi-headers-6.8.0-1008 - 6.8.0-1008.8 linux-raspi-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-raspi - 6.8.0-1008.8 linux-tools-raspi - 6.8.0-1008.8 No subscription required linux-buildinfo-6.8.0-1009-ibm - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-6.8.0-1009-ibm - 6.8.0-1009.9 linux-headers-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-ibm - 6.8.0-1009.9 linux-headers-ibm-classic - 6.8.0-1009.9 linux-headers-ibm-lts-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04a - 6.8.0-1009.9 linux-ibm - 6.8.0-1009.9 linux-ibm-classic - 6.8.0-1009.9 linux-ibm-cloud-tools-common - 6.8.0-1009.9 linux-ibm-headers-6.8.0-1009 - 6.8.0-1009.9 linux-ibm-lts-24.04 - 6.8.0-1009.9 linux-ibm-source-6.8.0 - 6.8.0-1009.9 linux-ibm-tools-6.8.0-1009 - 6.8.0-1009.9 linux-image-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-ibm - 6.8.0-1009.9 linux-image-ibm-classic - 6.8.0-1009.9 linux-image-ibm-lts-24.04 - 6.8.0-1009.9 linux-image-oem-24.04 - 6.8.0-1009.9 linux-image-oem-24.04a - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-uc-oem-24.04 - 6.8.0-1009.9 linux-image-uc-oem-24.04a - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-ipu6-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04 - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04a - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-iwlwifi-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-classic - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1009.9 linux-modules-usbio-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-usbio-oem-24.04 - 6.8.0-1009.9 linux-modules-usbio-oem-24.04a - 6.8.0-1009.9 linux-oem-24.04 - 6.8.0-1009.9 linux-oem-24.04a - 6.8.0-1009.9 linux-oem-6.8-headers-6.8.0-1009 - 6.8.0-1009.9 linux-oem-6.8-tools-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-ibm - 6.8.0-1009.9 linux-tools-6.8.0-1009-oem - 6.8.0-1009.9 linux-tools-ibm - 6.8.0-1009.9 linux-tools-ibm-classic - 6.8.0-1009.9 linux-tools-ibm-lts-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04a - 6.8.0-1009.9 No subscription required linux-buildinfo-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-cloud-tools-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-headers-nvidia - 6.8.0-1010.10 linux-headers-nvidia-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-nvidia - 6.8.0-1010.10 linux-image-nvidia-64k - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1010.10 linux-nvidia - 6.8.0-1010.10 linux-nvidia-64k - 6.8.0-1010.10 linux-nvidia-headers-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-host - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-tools-nvidia - 6.8.0-1010.10 linux-tools-nvidia-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-gcp - 6.8.0-1011.12 linux-gcp - 6.8.0-1011.12 linux-gcp-headers-6.8.0-1011 - 6.8.0-1011.12 linux-gcp-tools-6.8.0-1011 - 6.8.0-1011.12 linux-headers-6.8.0-1011-gcp - 6.8.0-1011.12 linux-headers-gcp - 6.8.0-1011.12 linux-image-6.8.0-1011-gcp - 6.8.0-1011.12 linux-image-gcp - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-gcp - 6.8.0-1011.12 linux-tools-6.8.0-1011-gcp - 6.8.0-1011.12 linux-tools-gcp - 6.8.0-1011.12 No subscription required linux-aws - 6.8.0-1012.13 linux-aws-cloud-tools-6.8.0-1012 - 6.8.0-1012.13 linux-aws-headers-6.8.0-1012 - 6.8.0-1012.13 linux-aws-tools-6.8.0-1012 - 6.8.0-1012.13 linux-buildinfo-6.8.0-1012-aws - 6.8.0-1012.13 linux-cloud-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-aws - 6.8.0-1012.13 linux-image-6.8.0-1012-aws - 6.8.0-1012.13 linux-image-aws - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-aws - 6.8.0-1012.13 linux-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-tools-aws - 6.8.0-1012.13 No subscription required linux-buildinfo-6.8.0-39-generic - 6.8.0-39.39 linux-buildinfo-6.8.0-39-generic-64k - 6.8.0-39.39 linux-cloud-tools-6.8.0-39 - 6.8.0-39.39 linux-cloud-tools-6.8.0-39-generic - 6.8.0-39.39 linux-cloud-tools-common - 6.8.0-39.39 linux-cloud-tools-generic - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-cloud-tools-virtual - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-crashdump - 6.8.0-39.39 linux-doc - 6.8.0-39.39 linux-generic - 6.8.0-39.39 linux-generic-64k - 6.8.0-39.39 linux-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-generic-hwe-24.04 - 6.8.0-39.39 linux-generic-hwe-24.04-edge - 6.8.0-39.39 linux-generic-lpae - 6.8.0-39.39 linux-headers-6.8.0-39 - 6.8.0-39.39 linux-headers-6.8.0-39-generic - 6.8.0-39.39 linux-headers-6.8.0-39-generic-64k - 6.8.0-39.39 linux-headers-generic - 6.8.0-39.39 linux-headers-generic-64k - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-lpae - 6.8.0-39.39 linux-headers-kvm - 6.8.0-39.39 linux-headers-laptop-23.10 - 6.8.0-39.39 linux-headers-oem-20.04 - 6.8.0-39.39 linux-headers-oem-20.04b - 6.8.0-39.39 linux-headers-oem-20.04c - 6.8.0-39.39 linux-headers-oem-20.04d - 6.8.0-39.39 linux-headers-oem-22.04 - 6.8.0-39.39 linux-headers-virtual - 6.8.0-39.39 linux-headers-virtual-hwe-24.04 - 6.8.0-39.39 linux-headers-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-6.8.0-39-generic - 6.8.0-39.39 linux-image-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-extra-virtual - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic - 6.8.0-39.39 linux-image-generic-64k - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-hwe-24.04 - 6.8.0-39.39 linux-image-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-lpae - 6.8.0-39.39 linux-image-kvm - 6.8.0-39.39 linux-image-laptop-23.10 - 6.8.0-39.39 linux-image-oem-20.04 - 6.8.0-39.39 linux-image-oem-20.04b - 6.8.0-39.39 linux-image-oem-20.04c - 6.8.0-39.39 linux-image-oem-20.04d - 6.8.0-39.39 linux-image-oem-22.04 - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-uc-generic - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04 - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-virtual - 6.8.0-39.39 linux-image-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-kvm - 6.8.0-39.39 linux-laptop-23.10 - 6.8.0-39.39 linux-lib-rust-6.8.0-39-generic - 6.8.0-39.39 linux-libc-dev - 6.8.0-39.39 linux-modules-6.8.0-39-generic - 6.8.0-39.39 linux-modules-6.8.0-39-generic-64k - 6.8.0-39.39 linux-modules-extra-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-generic - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-6.8.0-39-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04 - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04d - 6.8.0-39.39 linux-modules-iwlwifi-oem-22.04 - 6.8.0-39.39 linux-modules-usbio-6.8.0-39-generic - 6.8.0-39.39 linux-modules-usbio-generic - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-39.39 linux-oem-20.04 - 6.8.0-39.39 linux-oem-20.04b - 6.8.0-39.39 linux-oem-20.04c - 6.8.0-39.39 linux-oem-20.04d - 6.8.0-39.39 linux-oem-22.04 - 6.8.0-39.39 linux-source - 6.8.0-39.39 linux-source-6.8.0 - 6.8.0-39.39 linux-tools-6.8.0-39 - 6.8.0-39.39 linux-tools-6.8.0-39-generic - 6.8.0-39.39 linux-tools-6.8.0-39-generic-64k - 6.8.0-39.39 linux-tools-common - 6.8.0-39.39 linux-tools-generic - 6.8.0-39.39 linux-tools-generic-64k - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-lpae - 6.8.0-39.39 linux-tools-host - 6.8.0-39.39 linux-tools-kvm - 6.8.0-39.39 linux-tools-laptop-23.10 - 6.8.0-39.39 linux-tools-oem-20.04 - 6.8.0-39.39 linux-tools-oem-20.04b - 6.8.0-39.39 linux-tools-oem-20.04c - 6.8.0-39.39 linux-tools-oem-20.04d - 6.8.0-39.39 linux-tools-oem-22.04 - 6.8.0-39.39 linux-tools-virtual - 6.8.0-39.39 linux-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-virtual - 6.8.0-39.39 linux-virtual-hwe-24.04 - 6.8.0-39.39 linux-virtual-hwe-24.04-edge - 6.8.0-39.39 No subscription required
High
CVE-2024-25742
CVE-2024-35984
CVE-2024-35990
CVE-2024-35992
CVE-2024-35997
CVE-2024-36008
CVE-2024-36016
USN-6921-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984, CVE-2024-35992, CVE-2024-36008) Update Instructions: Run `sudo pro fix USN-6921-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-buildinfo-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-cloud-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency - 6.8.0-39.39.1 linux-headers-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency - 6.8.0-39.39.1 linux-image-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency - 6.8.0-39.39.1 linux-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-common - 6.8.0-39.39.1 linux-lowlatency-headers-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-lib-rust-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-lowlatency-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-tools-common - 6.8.0-39.39.1 linux-lowlatency-tools-host - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-modules-iwlwifi-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency - 6.8.0-39.39.1 linux-tools-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 No subscription required
High
CVE-2024-25742
CVE-2024-35984
CVE-2024-35990
CVE-2024-35992
CVE-2024-35997
CVE-2024-36008
CVE-2024-36016
USN-6929-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6929-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u422-b05-1~24.04 openjdk-8-doc - 8u422-b05-1~24.04 openjdk-8-jdk - 8u422-b05-1~24.04 openjdk-8-jdk-headless - 8u422-b05-1~24.04 openjdk-8-jre - 8u422-b05-1~24.04 openjdk-8-jre-headless - 8u422-b05-1~24.04 openjdk-8-jre-zero - 8u422-b05-1~24.04 openjdk-8-source - 8u422-b05-1~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
USN-6930-1 -- OpenJDK 11 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 11 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6930-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-doc - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-zero - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-source - 11.0.24+8-1ubuntu3~24.04.1 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
USN-6931-1 -- OpenJDK 17 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 17 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6931-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.12+7-1ubuntu2~24.04 openjdk-17-doc - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-zero - 17.0.12+7-1ubuntu2~24.04 openjdk-17-source - 17.0.12+7-1ubuntu2~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21145
CVE-2024-21147
USN-6932-1 -- OpenJDK 21 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 21 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 21 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 21 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6932-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.4+7-1ubuntu2~24.04 openjdk-21-doc - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-zero - 21.0.4+7-1ubuntu2~24.04 openjdk-21-source - 21.0.4+7-1ubuntu2~24.04 openjdk-21-testsupport - 21.0.4+7-1ubuntu2~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21145
CVE-2024-21147
USN-6934-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.39 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html https://www.oracle.com/security-alerts/cpujul2024.html Update Instructions: Run `sudo pro fix USN-6934-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.39-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.39-0ubuntu0.24.04.1 mysql-client - 8.0.39-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-router - 8.0.39-0ubuntu0.24.04.1 mysql-server - 8.0.39-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.39-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20996
CVE-2024-21125
CVE-2024-21127
CVE-2024-21129
CVE-2024-21130
CVE-2024-21134
CVE-2024-21142
CVE-2024-21162
CVE-2024-21163
CVE-2024-21165
CVE-2024-21171
CVE-2024-21173
CVE-2024-21177
CVE-2024-21179
CVE-2024-21185
USN-6937-1 -- OpenSSL vulnerabilities
Ubuntu 24.04 LTS
It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when certain non-default TLS server configurations were in use. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2024-2511) It was discovered that OpenSSL incorrectly handled checking excessively long DSA keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-4603) William Ahern discovered that OpenSSL incorrectly handled certain memory operations in a rarely-used API. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-4741) Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a certain API with an empty supported client protocols buffer. A remote attacker could possibly use this issue to obtain sensitive information, or cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535) Update Instructions: Run `sudo pro fix USN-6937-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.2 libssl-doc - 3.0.13-0ubuntu3.2 libssl3t64 - 3.0.13-0ubuntu3.2 openssl - 3.0.13-0ubuntu3.2 No subscription required
Low
CVE-2024-2511
CVE-2024-4603
CVE-2024-4741
CVE-2024-5535
USN-6939-1 -- Exim vulnerability
Ubuntu 24.04 LTS
Phillip Szelat discovered that Exim misparses multiline MIME header filenames. A remote attacker could use this issue to bypass a MIME filename extension-blocking protection mechanism and possibly deliver executable attachments to the mailboxes of end users. Update Instructions: Run `sudo pro fix USN-6939-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.1 exim4-base - 4.97-4ubuntu4.1 exim4-config - 4.97-4ubuntu4.1 exim4-daemon-heavy - 4.97-4ubuntu4.1 exim4-daemon-light - 4.97-4ubuntu4.1 exim4-dev - 4.97-4ubuntu4.1 eximon4 - 4.97-4ubuntu4.1 No subscription required
Medium
CVE-2024-39929
USN-6940-1 -- snapd vulnerabilities
Ubuntu 24.04 LTS
Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. (CVE-2024-1724) Zeyad Gouda discovered that snapd failed to properly check the file type when extracting a snap. An attacker who could convince a user to install a malicious snap containing non-regular files could then cause snapd to block indefinitely while trying to read from such files and cause a denial of service. (CVE-2024-29068) Zeyad Gouda discovered that snapd failed to properly check the destination of symbolic links when extracting a snap. An attacker who could convince a user to install a malicious snap containing crafted symbolic links could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow a local unprivileged user to gain access to privileged information. (CVE-2024-29069) Update Instructions: Run `sudo pro fix USN-6940-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-snapcore-snapd-dev - 2.63+24.04ubuntu0.1 golang-github-ubuntu-core-snappy-dev - 2.63+24.04ubuntu0.1 snap-confine - 2.63+24.04ubuntu0.1 snapd - 2.63+24.04ubuntu0.1 snapd-xdg-open - 2.63+24.04ubuntu0.1 ubuntu-core-launcher - 2.63+24.04ubuntu0.1 ubuntu-core-snapd-units - 2.63+24.04ubuntu0.1 ubuntu-snappy - 2.63+24.04ubuntu0.1 ubuntu-snappy-cli - 2.63+24.04ubuntu0.1 No subscription required
Medium
CVE-2024-1724
CVE-2024-29068
CVE-2024-29069
USN-6941-1 -- Python vulnerability
Ubuntu 24.04 LTS
It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies. Update Instructions: Run `sudo pro fix USN-6941-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.1 libpython3.12-dev - 3.12.3-1ubuntu0.1 libpython3.12-minimal - 3.12.3-1ubuntu0.1 libpython3.12-stdlib - 3.12.3-1ubuntu0.1 libpython3.12-testsuite - 3.12.3-1ubuntu0.1 libpython3.12t64 - 3.12.3-1ubuntu0.1 python3.12 - 3.12.3-1ubuntu0.1 python3.12-dev - 3.12.3-1ubuntu0.1 python3.12-doc - 3.12.3-1ubuntu0.1 python3.12-examples - 3.12.3-1ubuntu0.1 python3.12-full - 3.12.3-1ubuntu0.1 python3.12-minimal - 3.12.3-1ubuntu0.1 python3.12-nopie - 3.12.3-1ubuntu0.1 python3.12-venv - 3.12.3-1ubuntu0.1 No subscription required
Low
CVE-2024-4032
USN-6942-1 -- Gross vulnerability
Ubuntu 24.04 LTS
It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6942-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gross - 1.0.2-4ubuntu0.24.04.1 No subscription required
Medium
CVE-2023-52159
USN-6944-1 -- curl vulnerability
Ubuntu 24.04 LTS
Dov Murik discovered that curl incorrectly handled parsing ASN.1 Generalized Time fields. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Update Instructions: Run `sudo pro fix USN-6944-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.2 libcurl3t64-gnutls - 8.5.0-2ubuntu10.2 libcurl4-doc - 8.5.0-2ubuntu10.2 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.2 libcurl4-openssl-dev - 8.5.0-2ubuntu10.2 libcurl4t64 - 8.5.0-2ubuntu10.2 No subscription required
Medium
CVE-2024-7264
USN-6945-1 -- wpa_supplicant and hostapd vulnerability
Ubuntu 24.04 LTS
Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. Update Instructions: Run `sudo pro fix USN-6945-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.1 hostapd - 2:2.10-21ubuntu0.1 libwpa-client-dev - 2:2.10-21ubuntu0.1 wpagui - 2:2.10-21ubuntu0.1 wpasupplicant - 2:2.10-21ubuntu0.1 No subscription required
Medium
CVE-2024-5290
https://launchpad.net/bugs/2067613
USN-6946-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain strings in floatformat function. An attacker could possibly use this issue to cause a memory exhaustion. (CVE-2024-41989) It was discovered that Django incorrectly handled very large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41990) It was discovered that Django in AdminURLFieldWidget incorrectly handled certain inputs with a very large number of Unicode characters. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41991) It was discovered that Django incorrectly handled certain JSON objects. An attacker could possibly use this issue to cause a potential SQL injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-42005) Update Instructions: Run `sudo pro fix USN-6946-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.2 python3-django - 3:4.2.11-1ubuntu1.2 No subscription required
Medium
CVE-2024-41989
CVE-2024-41990
CVE-2024-41991
CVE-2024-42005
USN-6947-1 -- Kerberos vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Kerberos incorrectly handled GSS message tokens where an unwrapped token could appear to be truncated. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37370) It was discovered that Kerberos incorrectly handled GSS message tokens when sent a token with invalid length fields. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37371) Update Instructions: Run `sudo pro fix USN-6947-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.1 krb5-doc - 1.20.1-6ubuntu2.1 krb5-gss-samples - 1.20.1-6ubuntu2.1 krb5-k5tls - 1.20.1-6ubuntu2.1 krb5-kdc - 1.20.1-6ubuntu2.1 krb5-kdc-ldap - 1.20.1-6ubuntu2.1 krb5-kpropd - 1.20.1-6ubuntu2.1 krb5-locales - 1.20.1-6ubuntu2.1 krb5-multidev - 1.20.1-6ubuntu2.1 krb5-otp - 1.20.1-6ubuntu2.1 krb5-pkinit - 1.20.1-6ubuntu2.1 krb5-user - 1.20.1-6ubuntu2.1 libgssapi-krb5-2 - 1.20.1-6ubuntu2.1 libgssrpc4t64 - 1.20.1-6ubuntu2.1 libk5crypto3 - 1.20.1-6ubuntu2.1 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.1 libkadm5srv-mit12 - 1.20.1-6ubuntu2.1 libkdb5-10t64 - 1.20.1-6ubuntu2.1 libkrad-dev - 1.20.1-6ubuntu2.1 libkrad0 - 1.20.1-6ubuntu2.1 libkrb5-3 - 1.20.1-6ubuntu2.1 libkrb5-dev - 1.20.1-6ubuntu2.1 libkrb5support0 - 1.20.1-6ubuntu2.1 No subscription required
Medium
CVE-2024-37370
CVE-2024-37371
USN-6949-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gke - 6.8.0-1008.11 linux-gke - 6.8.0-1008.11 linux-gke-headers-6.8.0-1008 - 6.8.0-1008.11 linux-gke-tools-6.8.0-1008 - 6.8.0-1008.11 linux-headers-6.8.0-1008-gke - 6.8.0-1008.11 linux-headers-gke - 6.8.0-1008.11 linux-image-6.8.0-1008-gke - 6.8.0-1008.11 linux-image-gke - 6.8.0-1008.11 linux-image-unsigned-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-extra-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-gke - 6.8.0-1008.11 linux-tools-6.8.0-1008-gke - 6.8.0-1008.11 linux-tools-gke - 6.8.0-1008.11 No subscription required linux-buildinfo-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-ibm - 6.8.0-1010.10 linux-headers-ibm-classic - 6.8.0-1010.10 linux-headers-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm - 6.8.0-1010.10 linux-ibm-classic - 6.8.0-1010.10 linux-ibm-cloud-tools-common - 6.8.0-1010.10 linux-ibm-headers-6.8.0-1010 - 6.8.0-1010.10 linux-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm-source-6.8.0 - 6.8.0-1010.10 linux-ibm-tools-6.8.0-1010 - 6.8.0-1010.10 linux-image-6.8.0-1010-ibm - 6.8.0-1010.10 linux-image-ibm - 6.8.0-1010.10 linux-image-ibm-classic - 6.8.0-1010.10 linux-image-ibm-lts-24.04 - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-classic - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1010.10 linux-tools-6.8.0-1010-ibm - 6.8.0-1010.10 linux-tools-ibm - 6.8.0-1010.10 linux-tools-ibm-classic - 6.8.0-1010.10 linux-tools-ibm-lts-24.04 - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-cloud-tools-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-headers-nvidia - 6.8.0-1011.11 linux-headers-nvidia-64k - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-nvidia - 6.8.0-1011.11 linux-image-nvidia-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1011.11 linux-nvidia - 6.8.0-1011.11 linux-nvidia-64k - 6.8.0-1011.11 linux-nvidia-headers-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-host - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-tools-nvidia - 6.8.0-1011.11 linux-tools-nvidia-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-gcp - 6.8.0-1012.13 linux-gcp - 6.8.0-1012.13 linux-gcp-headers-6.8.0-1012 - 6.8.0-1012.13 linux-gcp-tools-6.8.0-1012 - 6.8.0-1012.13 linux-headers-6.8.0-1012-gcp - 6.8.0-1012.13 linux-headers-gcp - 6.8.0-1012.13 linux-image-6.8.0-1012-gcp - 6.8.0-1012.13 linux-image-gcp - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-gcp - 6.8.0-1012.13 linux-tools-6.8.0-1012-gcp - 6.8.0-1012.13 linux-tools-gcp - 6.8.0-1012.13 No subscription required linux-aws - 6.8.0-1013.14 linux-aws-cloud-tools-6.8.0-1013 - 6.8.0-1013.14 linux-aws-headers-6.8.0-1013 - 6.8.0-1013.14 linux-aws-tools-6.8.0-1013 - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-aws - 6.8.0-1013.14 linux-cloud-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-aws - 6.8.0-1013.14 linux-image-6.8.0-1013-aws - 6.8.0-1013.14 linux-image-aws - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-aws - 6.8.0-1013.14 linux-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-tools-aws - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-40-generic - 6.8.0-40.40 linux-buildinfo-6.8.0-40-generic-64k - 6.8.0-40.40 linux-cloud-tools-6.8.0-40 - 6.8.0-40.40 linux-cloud-tools-6.8.0-40-generic - 6.8.0-40.40 linux-cloud-tools-common - 6.8.0-40.40 linux-cloud-tools-generic - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-cloud-tools-virtual - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-crashdump - 6.8.0-40.40 linux-doc - 6.8.0-40.40 linux-generic - 6.8.0-40.40 linux-generic-64k - 6.8.0-40.40 linux-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-generic-hwe-24.04 - 6.8.0-40.40 linux-generic-hwe-24.04-edge - 6.8.0-40.40 linux-generic-lpae - 6.8.0-40.40 linux-headers-6.8.0-40 - 6.8.0-40.40 linux-headers-6.8.0-40-generic - 6.8.0-40.40 linux-headers-6.8.0-40-generic-64k - 6.8.0-40.40 linux-headers-generic - 6.8.0-40.40 linux-headers-generic-64k - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-lpae - 6.8.0-40.40 linux-headers-kvm - 6.8.0-40.40 linux-headers-laptop-23.10 - 6.8.0-40.40 linux-headers-oem-20.04 - 6.8.0-40.40 linux-headers-oem-20.04b - 6.8.0-40.40 linux-headers-oem-20.04c - 6.8.0-40.40 linux-headers-oem-20.04d - 6.8.0-40.40 linux-headers-oem-22.04 - 6.8.0-40.40 linux-headers-virtual - 6.8.0-40.40 linux-headers-virtual-hwe-24.04 - 6.8.0-40.40 linux-headers-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-6.8.0-40-generic - 6.8.0-40.40 linux-image-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-extra-virtual - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic - 6.8.0-40.40 linux-image-generic-64k - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-hwe-24.04 - 6.8.0-40.40 linux-image-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-lpae - 6.8.0-40.40 linux-image-kvm - 6.8.0-40.40 linux-image-laptop-23.10 - 6.8.0-40.40 linux-image-oem-20.04 - 6.8.0-40.40 linux-image-oem-20.04b - 6.8.0-40.40 linux-image-oem-20.04c - 6.8.0-40.40 linux-image-oem-20.04d - 6.8.0-40.40 linux-image-oem-22.04 - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-uc-generic - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04 - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-virtual - 6.8.0-40.40 linux-image-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-kvm - 6.8.0-40.40 linux-laptop-23.10 - 6.8.0-40.40 linux-lib-rust-6.8.0-40-generic - 6.8.0-40.40 linux-libc-dev - 6.8.0-40.40 linux-modules-6.8.0-40-generic - 6.8.0-40.40 linux-modules-6.8.0-40-generic-64k - 6.8.0-40.40 linux-modules-extra-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-generic - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-6.8.0-40-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04 - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04d - 6.8.0-40.40 linux-modules-iwlwifi-oem-22.04 - 6.8.0-40.40 linux-modules-usbio-6.8.0-40-generic - 6.8.0-40.40 linux-modules-usbio-generic - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-40.40 linux-oem-20.04 - 6.8.0-40.40 linux-oem-20.04b - 6.8.0-40.40 linux-oem-20.04c - 6.8.0-40.40 linux-oem-20.04d - 6.8.0-40.40 linux-oem-22.04 - 6.8.0-40.40 linux-source - 6.8.0-40.40 linux-source-6.8.0 - 6.8.0-40.40 linux-tools-6.8.0-40 - 6.8.0-40.40 linux-tools-6.8.0-40-generic - 6.8.0-40.40 linux-tools-6.8.0-40-generic-64k - 6.8.0-40.40 linux-tools-common - 6.8.0-40.40 linux-tools-generic - 6.8.0-40.40 linux-tools-generic-64k - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-lpae - 6.8.0-40.40 linux-tools-host - 6.8.0-40.40 linux-tools-kvm - 6.8.0-40.40 linux-tools-laptop-23.10 - 6.8.0-40.40 linux-tools-oem-20.04 - 6.8.0-40.40 linux-tools-oem-20.04b - 6.8.0-40.40 linux-tools-oem-20.04c - 6.8.0-40.40 linux-tools-oem-20.04d - 6.8.0-40.40 linux-tools-oem-22.04 - 6.8.0-40.40 linux-tools-virtual - 6.8.0-40.40 linux-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-virtual - 6.8.0-40.40 linux-virtual-hwe-24.04 - 6.8.0-40.40 linux-virtual-hwe-24.04-edge - 6.8.0-40.40 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6949-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-raspi - 6.8.0-1009.10 linux-image-6.8.0-1009-raspi - 6.8.0-1009.10 linux-image-raspi - 6.8.0-1009.10 linux-modules-6.8.0-1009-raspi - 6.8.0-1009.10 linux-raspi - 6.8.0-1009.10 linux-raspi-headers-6.8.0-1009 - 6.8.0-1009.10 linux-raspi-tools-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-raspi - 6.8.0-1009.10 linux-tools-raspi - 6.8.0-1009.10 No subscription required linux-buildinfo-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-buildinfo-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-cloud-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency - 6.8.0-40.40.1 linux-headers-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency - 6.8.0-40.40.1 linux-image-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency - 6.8.0-40.40.1 linux-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-common - 6.8.0-40.40.1 linux-lowlatency-headers-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-lib-rust-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-lowlatency-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-tools-common - 6.8.0-40.40.1 linux-lowlatency-tools-host - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-modules-iwlwifi-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency - 6.8.0-40.40.1 linux-tools-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6952-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oracle - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-oracle - 6.8.0-1010.10 linux-headers-oracle-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-image-oracle - 6.8.0-1010.10 linux-image-oracle-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-iwlwifi-oracle - 6.8.0-1010.10 linux-oracle - 6.8.0-1010.10 linux-oracle-64k - 6.8.0-1010.10 linux-oracle-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oracle-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-tools-oracle - 6.8.0-1010.10 linux-tools-oracle-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-buildinfo-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-extra-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency - 6.8.0-1011.11.1 linux-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency-headers-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1011.11.1 No subscription required
High
CVE-2023-52882
CVE-2024-25742
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35984
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35990
CVE-2024-35991
CVE-2024-35992
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35997
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36008
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36016
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6952-2 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1012.14 linux-azure-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-azure-fde - 6.8.0-1012.14 linux-azure-headers-6.8.0-1012 - 6.8.0-1012.14 linux-azure-tools-6.8.0-1012 - 6.8.0-1012.14 linux-buildinfo-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-azure - 6.8.0-1012.14 linux-headers-6.8.0-1012-azure - 6.8.0-1012.14 linux-headers-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure-fde - 6.8.0-1012.14 linux-image-azure - 6.8.0-1012.14 linux-image-azure-fde - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-azure - 6.8.0-1012.14 linux-modules-involflt-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-involflt-azure - 6.8.0-1012.14 linux-modules-iwlwifi-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-iwlwifi-azure - 6.8.0-1012.14 linux-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-tools-azure - 6.8.0-1012.14 No subscription required
High
CVE-2023-52882
CVE-2024-25742
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35984
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35990
CVE-2024-35991
CVE-2024-35992
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35997
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36008
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36016
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6955-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-35987, CVE-2024-36931, CVE-2024-38614, CVE-2024-35857, CVE-2024-36949, CVE-2024-38599, CVE-2024-35994, CVE-2024-35849, CVE-2024-36916, CVE-2024-38590, CVE-2024-36944, CVE-2024-38561, CVE-2024-38538, CVE-2024-36017, CVE-2024-38593, CVE-2024-36028, CVE-2024-36960, CVE-2024-36002, CVE-2024-36967, CVE-2024-36898, CVE-2024-35989, CVE-2024-36975, CVE-2024-38578, CVE-2024-38582, CVE-2024-38588, CVE-2024-38579, CVE-2024-38617, CVE-2024-36901, CVE-2024-38550, CVE-2023-52882, CVE-2024-38603, CVE-2024-38620, CVE-2024-36956, CVE-2024-36880, CVE-2024-36895, CVE-2024-36979, CVE-2024-36887, CVE-2024-27396, CVE-2024-27400, CVE-2024-36952, CVE-2024-36886, CVE-2024-36905, CVE-2024-36883, CVE-2024-38540, CVE-2024-38605, CVE-2024-36029, CVE-2024-36934, CVE-2024-27395, CVE-2024-36000, CVE-2024-38549, CVE-2024-35999, CVE-2024-38585, CVE-2024-38589, CVE-2024-38565, CVE-2024-36917, CVE-2024-36930, CVE-2024-36940, CVE-2024-36900, CVE-2024-35850, CVE-2024-38592, CVE-2024-38553, CVE-2024-36929, CVE-2024-36915, CVE-2024-36004, CVE-2024-38573, CVE-2024-36941, CVE-2024-38607, CVE-2024-36009, CVE-2024-27398, CVE-2024-36909, CVE-2024-35848, CVE-2024-36950, CVE-2024-38564, CVE-2024-36947, CVE-2024-38613, CVE-2024-38570, CVE-2024-38612, CVE-2024-38580, CVE-2024-38557, CVE-2024-36959, CVE-2024-27399, CVE-2024-41011, CVE-2024-36928, CVE-2024-38543, CVE-2024-38541, CVE-2024-38583, CVE-2024-35855, CVE-2024-38611, CVE-2024-36891, CVE-2024-38587, CVE-2024-35851, CVE-2024-38546, CVE-2024-38596, CVE-2024-35998, CVE-2024-35991, CVE-2024-36965, CVE-2024-36925, CVE-2024-36894, CVE-2024-38567, CVE-2024-38572, CVE-2024-36882, CVE-2024-38594, CVE-2024-38563, CVE-2024-38616, CVE-2024-36951, CVE-2024-36005, CVE-2024-42134, CVE-2024-38602, CVE-2024-36014, CVE-2024-38601, CVE-2024-36001, CVE-2024-38575, CVE-2024-27401, CVE-2024-36961, CVE-2024-38576, CVE-2024-36935, CVE-2024-36893, CVE-2024-38562, CVE-2024-36904, CVE-2024-36939, CVE-2024-38591, CVE-2024-38539, CVE-2024-36030, CVE-2024-36920, CVE-2024-39482, CVE-2024-36977, CVE-2024-36013, CVE-2024-35856, CVE-2024-36922, CVE-2024-36033, CVE-2024-35859, CVE-2024-36919, CVE-2024-35846, CVE-2024-36913, CVE-2024-35854, CVE-2024-36924, CVE-2024-38547, CVE-2024-38551, CVE-2024-36899, CVE-2024-36932, CVE-2024-38545, CVE-2024-36966, CVE-2024-36911, CVE-2024-36946, CVE-2024-36906, CVE-2024-38595, CVE-2024-36012, CVE-2024-38552, CVE-2024-36933, CVE-2024-36936, CVE-2024-38548, CVE-2024-38558, CVE-2024-36006, CVE-2024-36908, CVE-2024-36892, CVE-2024-35988, CVE-2024-35993, CVE-2024-36914, CVE-2024-36896, CVE-2024-38615, CVE-2024-36890, CVE-2024-36969, CVE-2024-38559, CVE-2024-36964, CVE-2024-38560, CVE-2024-38574, CVE-2024-36962, CVE-2024-38542, CVE-2024-36926, CVE-2024-36968, CVE-2024-36032, CVE-2024-38544, CVE-2024-36938, CVE-2024-38597, CVE-2024-38577, CVE-2024-36958, CVE-2024-36945, CVE-2024-36943, CVE-2024-38610, CVE-2024-36927, CVE-2024-38554, CVE-2024-38555, CVE-2024-36031, CVE-2024-36011, CVE-2024-38569, CVE-2024-35847, CVE-2024-36921, CVE-2024-38606, CVE-2024-35949, CVE-2024-35947, CVE-2024-36889, CVE-2024-36884, CVE-2024-36954, CVE-2024-36902, CVE-2024-36007, CVE-2024-38586, CVE-2024-36918, CVE-2024-38571, CVE-2024-36955, CVE-2024-36888, CVE-2024-38556, CVE-2024-38604, CVE-2024-27394, CVE-2024-38600, CVE-2024-35983, CVE-2024-38568, CVE-2024-38566, CVE-2024-35853, CVE-2024-35858, CVE-2024-36910, CVE-2024-36903, CVE-2024-36881, CVE-2024-36937, CVE-2024-36957, CVE-2024-36912, CVE-2024-36948, CVE-2024-36953, CVE-2024-35996, CVE-2024-36963, CVE-2024-36923, CVE-2024-35852, CVE-2024-38598, CVE-2024-36003, CVE-2024-35986, CVE-2024-38584) Update Instructions: Run `sudo pro fix USN-6955-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-oem-24.04 - 6.8.0-1010.10 linux-headers-oem-24.04a - 6.8.0-1010.10 linux-image-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-oem-24.04 - 6.8.0-1010.10 linux-image-oem-24.04a - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-uc-oem-24.04 - 6.8.0-1010.10 linux-image-uc-oem-24.04a - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04 - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04a - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1010.10 linux-modules-usbio-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-usbio-oem-24.04 - 6.8.0-1010.10 linux-modules-usbio-oem-24.04a - 6.8.0-1010.10 linux-oem-24.04 - 6.8.0-1010.10 linux-oem-24.04a - 6.8.0-1010.10 linux-oem-6.8-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oem-6.8-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oem - 6.8.0-1010.10 linux-tools-oem-24.04 - 6.8.0-1010.10 linux-tools-oem-24.04a - 6.8.0-1010.10 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6959-1 -- .NET vulnerability
Ubuntu 24.04 LTS
It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Update Instructions: Run `sudo pro fix USN-6959-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.108-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.108-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.108-8.0.8-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-38167
USN-6961-1 -- BusyBox vulnerabilities
Ubuntu 24.04 LTS
It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48174) It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365) Update Instructions: Run `sudo pro fix USN-6961-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: busybox - 1:1.36.1-6ubuntu3.1 busybox-initramfs - 1:1.36.1-6ubuntu3.1 busybox-static - 1:1.36.1-6ubuntu3.1 busybox-syslogd - 1:1.36.1-6ubuntu3.1 udhcpc - 1:1.36.1-6ubuntu3.1 udhcpd - 1:1.36.1-6ubuntu3.1 No subscription required
Medium
CVE-2022-48174
CVE-2023-42363
CVE-2023-42364
CVE-2023-42365
USN-6962-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros. Update Instructions: Run `sudo pro fix USN-6962-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.5-0ubuntu0.24.04.2 libjuh-java - 4:24.2.5-0ubuntu0.24.04.2 libjurt-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.5-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.5-0ubuntu0.24.04.2 libreoffice - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.5-0ubuntu0.24.04.2 libridl-java - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libunoil-java - 4:24.2.5-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.5-0ubuntu0.24.04.2 python3-access2base - 4:24.2.5-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.5-0ubuntu0.24.04.2 python3-uno - 4:24.2.5-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.5-0ubuntu0.24.04.2 ure - 4:24.2.5-0ubuntu0.24.04.2 ure-java - 4:24.2.5-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-6472
USN-6963-1 -- GNOME Shell vulnerability
Ubuntu 24.04 LTS
It was discovered that GNOME Shell incorrectly opened the portal helper automatically when detecting a captive network portal. A remote attacker could possibly use this issue to load arbitrary web pages containing JavaScript, leading to resource consumption or other attacks. Update Instructions: Run `sudo pro fix USN-6963-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-shell - 46.0-0ubuntu6~24.04.3 gnome-shell-common - 46.0-0ubuntu6~24.04.3 gnome-shell-extension-prefs - 46.0-0ubuntu6~24.04.3 No subscription required
Medium
CVE-2024-36472
USN-6964-1 -- ORC vulnerability
Ubuntu 24.04 LTS
Noriko Totsuka discovered that ORC incorrectly handled certain crafted file. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6964-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liborc-0.4-0t64 - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev-bin - 1:0.4.38-1ubuntu0.1 liborc-0.4-doc - 1:0.4.38-1ubuntu0.1 No subscription required
Medium
CVE-2024-40897
USN-6967-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-42667) It was discovered that some Intel® Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-49141) It was discovered that some Intel® Processors did not correctly transition between the executive monitor and SMI transfer monitor (STM). A privileged local attacker could use this to escalate their privileges. (CVE-2024-24853) It was discovered that some 3rd, 4th, and 5th Generation Intel® Xeon® Processors failed to properly implement a protection mechanism. A local attacker could use this to potentially escalate their privileges. (CVE-2024-24980) It was discovered that some 3rd Generation Intel Xeon Scalable Processors did not properly handle mirrored regions with different values. A privileged local user could use this to cause a denial of service (system crash). (CVE-2024-25939) Update Instructions: Run `sudo pro fix USN-6967-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240813.0ubuntu0.24.04.2 No subscription required
Medium
CVE-2023-42667
CVE-2023-49141
CVE-2024-24853
CVE-2024-24980
CVE-2024-25939
USN-6968-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser. Update Instructions: Run `sudo pro fix USN-6968-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.4-0ubuntu0.24.04.1 libecpg-dev - 16.4-0ubuntu0.24.04.1 libecpg6 - 16.4-0ubuntu0.24.04.1 libpgtypes3 - 16.4-0ubuntu0.24.04.1 libpq-dev - 16.4-0ubuntu0.24.04.1 libpq5 - 16.4-0ubuntu0.24.04.1 postgresql-16 - 16.4-0ubuntu0.24.04.1 postgresql-client-16 - 16.4-0ubuntu0.24.04.1 postgresql-doc-16 - 16.4-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.4-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.4-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.4-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.4-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-7348
USN-6969-1 -- Cacti vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Cacti did not properly apply checks to the "Package Import" feature. An attacker could possibly use this issue to perform arbitrary code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-25641) It was discovered that Cacti did not properly sanitize values when using javascript based API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29894) It was discovered that Cacti did not properly sanitize values when managing data queries. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31443) It was discovered that Cacti did not properly sanitize values when reading tree rules with Automation API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31444) It was discovered that Cacti did not properly sanitize "get_request_var('filter')" values in the "api_automation.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31445) It was discovered that Cacti did not properly sanitize data stored in "form_save()" function in the "graph_template_inputs.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. (CVE-2024-31458) It was discovered that Cacti did not properly validate the file urls from the lib/plugin.php file. An attacker could possibly use this issue to perform arbitrary code execution. (CVE-2024-31459) It was discovered that Cacti did not properly validate the data stored in the "automation_tree_rules.php". A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31460) It was discovered that Cacti did not properly verify the user password. An attacker could possibly use this issue to bypass authentication mechanism. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-34360) Update Instructions: Run `sudo pro fix USN-6969-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cacti - 1.2.26+ds1-1ubuntu0.1 No subscription required
Medium
CVE-2024-25641
CVE-2024-29894
CVE-2024-31443
CVE-2024-31444
CVE-2024-31445
CVE-2024-31458
CVE-2024-31459
CVE-2024-31460
CVE-2024-34340
USN-6975-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - User-Mode Linux (UML); - MMC subsystem; (CVE-2024-39292, CVE-2024-39484) Update Instructions: Run `sudo pro fix USN-6975-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gke - 6.8.0-1009.12 linux-gke - 6.8.0-1009.12 linux-gke-headers-6.8.0-1009 - 6.8.0-1009.12 linux-gke-tools-6.8.0-1009 - 6.8.0-1009.12 linux-headers-6.8.0-1009-gke - 6.8.0-1009.12 linux-headers-gke - 6.8.0-1009.12 linux-image-6.8.0-1009-gke - 6.8.0-1009.12 linux-image-gke - 6.8.0-1009.12 linux-image-unsigned-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-extra-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-gke - 6.8.0-1009.12 linux-tools-6.8.0-1009-gke - 6.8.0-1009.12 linux-tools-gke - 6.8.0-1009.12 No subscription required linux-buildinfo-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-raspi - 6.8.0-1010.11 linux-image-6.8.0-1010-raspi - 6.8.0-1010.11 linux-image-raspi - 6.8.0-1010.11 linux-modules-6.8.0-1010-raspi - 6.8.0-1010.11 linux-raspi - 6.8.0-1010.11 linux-raspi-headers-6.8.0-1010 - 6.8.0-1010.11 linux-raspi-tools-6.8.0-1010 - 6.8.0-1010.11 linux-tools-6.8.0-1010-raspi - 6.8.0-1010.11 linux-tools-raspi - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-1011-ibm - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oem - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-6.8.0-1011-ibm - 6.8.0-1011.11 linux-headers-6.8.0-1011-oem - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-ibm - 6.8.0-1011.11 linux-headers-ibm-classic - 6.8.0-1011.11 linux-headers-ibm-lts-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04a - 6.8.0-1011.11 linux-headers-oracle - 6.8.0-1011.11 linux-headers-oracle-64k - 6.8.0-1011.11 linux-ibm - 6.8.0-1011.11 linux-ibm-classic - 6.8.0-1011.11 linux-ibm-cloud-tools-common - 6.8.0-1011.11 linux-ibm-headers-6.8.0-1011 - 6.8.0-1011.11 linux-ibm-lts-24.04 - 6.8.0-1011.11 linux-ibm-source-6.8.0 - 6.8.0-1011.11 linux-ibm-tools-6.8.0-1011 - 6.8.0-1011.11 linux-image-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-image-ibm - 6.8.0-1011.11 linux-image-ibm-classic - 6.8.0-1011.11 linux-image-ibm-lts-24.04 - 6.8.0-1011.11 linux-image-oem-24.04 - 6.8.0-1011.11 linux-image-oem-24.04a - 6.8.0-1011.11 linux-image-oracle - 6.8.0-1011.11 linux-image-oracle-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-uc-oem-24.04 - 6.8.0-1011.11 linux-image-uc-oem-24.04a - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-ipu6-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04 - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-iwlwifi-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-classic - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-oracle - 6.8.0-1011.11 linux-modules-usbio-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-usbio-oem-24.04 - 6.8.0-1011.11 linux-modules-usbio-oem-24.04a - 6.8.0-1011.11 linux-oem-24.04 - 6.8.0-1011.11 linux-oem-24.04a - 6.8.0-1011.11 linux-oem-6.8-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oem-6.8-tools-6.8.0-1011 - 6.8.0-1011.11 linux-oracle - 6.8.0-1011.11 linux-oracle-64k - 6.8.0-1011.11 linux-oracle-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oracle-tools-6.8.0-1011 - 6.8.0-1011.11 linux-tools-6.8.0-1011-ibm - 6.8.0-1011.11 linux-tools-6.8.0-1011-oem - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-tools-ibm - 6.8.0-1011.11 linux-tools-ibm-classic - 6.8.0-1011.11 linux-tools-ibm-lts-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04a - 6.8.0-1011.11 linux-tools-oracle - 6.8.0-1011.11 linux-tools-oracle-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-cloud-tools-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-headers-nvidia - 6.8.0-1012.12 linux-headers-nvidia-64k - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-nvidia - 6.8.0-1012.12 linux-image-nvidia-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1012.12 linux-nvidia - 6.8.0-1012.12 linux-nvidia-64k - 6.8.0-1012.12 linux-nvidia-headers-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-host - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-tools-nvidia - 6.8.0-1012.12 linux-tools-nvidia-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-buildinfo-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-extra-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency - 6.8.0-1012.12.1 linux-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency-headers-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1012.12.1 No subscription required linux-buildinfo-6.8.0-1013-gcp - 6.8.0-1013.14 linux-gcp - 6.8.0-1013.14 linux-gcp-headers-6.8.0-1013 - 6.8.0-1013.14 linux-gcp-tools-6.8.0-1013 - 6.8.0-1013.14 linux-headers-6.8.0-1013-gcp - 6.8.0-1013.14 linux-headers-gcp - 6.8.0-1013.14 linux-image-6.8.0-1013-gcp - 6.8.0-1013.14 linux-image-gcp - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-gcp - 6.8.0-1013.14 linux-tools-6.8.0-1013-gcp - 6.8.0-1013.14 linux-tools-gcp - 6.8.0-1013.14 No subscription required linux-azure - 6.8.0-1013.15 linux-azure-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-azure-fde - 6.8.0-1013.15 linux-azure-headers-6.8.0-1013 - 6.8.0-1013.15 linux-azure-tools-6.8.0-1013 - 6.8.0-1013.15 linux-buildinfo-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-azure - 6.8.0-1013.15 linux-headers-6.8.0-1013-azure - 6.8.0-1013.15 linux-headers-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure-fde - 6.8.0-1013.15 linux-image-azure - 6.8.0-1013.15 linux-image-azure-fde - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-azure - 6.8.0-1013.15 linux-modules-involflt-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-involflt-azure - 6.8.0-1013.15 linux-modules-iwlwifi-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-iwlwifi-azure - 6.8.0-1013.15 linux-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-tools-azure - 6.8.0-1013.15 No subscription required linux-aws - 6.8.0-1014.15 linux-aws-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-aws-headers-6.8.0-1014 - 6.8.0-1014.15 linux-aws-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-aws - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-aws - 6.8.0-1014.15 linux-image-6.8.0-1014-aws - 6.8.0-1014.15 linux-image-aws - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-aws - 6.8.0-1014.15 linux-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-tools-aws - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-41-generic - 6.8.0-41.41 linux-buildinfo-6.8.0-41-generic-64k - 6.8.0-41.41 linux-cloud-tools-6.8.0-41 - 6.8.0-41.41 linux-cloud-tools-6.8.0-41-generic - 6.8.0-41.41 linux-cloud-tools-common - 6.8.0-41.41 linux-cloud-tools-generic - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-cloud-tools-virtual - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-crashdump - 6.8.0-41.41 linux-doc - 6.8.0-41.41 linux-generic - 6.8.0-41.41 linux-generic-64k - 6.8.0-41.41 linux-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-generic-hwe-24.04 - 6.8.0-41.41 linux-generic-hwe-24.04-edge - 6.8.0-41.41 linux-generic-lpae - 6.8.0-41.41 linux-headers-6.8.0-41 - 6.8.0-41.41 linux-headers-6.8.0-41-generic - 6.8.0-41.41 linux-headers-6.8.0-41-generic-64k - 6.8.0-41.41 linux-headers-generic - 6.8.0-41.41 linux-headers-generic-64k - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-lpae - 6.8.0-41.41 linux-headers-kvm - 6.8.0-41.41 linux-headers-laptop-23.10 - 6.8.0-41.41 linux-headers-oem-20.04 - 6.8.0-41.41 linux-headers-oem-20.04b - 6.8.0-41.41 linux-headers-oem-20.04c - 6.8.0-41.41 linux-headers-oem-20.04d - 6.8.0-41.41 linux-headers-oem-22.04 - 6.8.0-41.41 linux-headers-virtual - 6.8.0-41.41 linux-headers-virtual-hwe-24.04 - 6.8.0-41.41 linux-headers-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-6.8.0-41-generic - 6.8.0-41.41 linux-image-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-extra-virtual - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic - 6.8.0-41.41 linux-image-generic-64k - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-hwe-24.04 - 6.8.0-41.41 linux-image-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-lpae - 6.8.0-41.41 linux-image-kvm - 6.8.0-41.41 linux-image-laptop-23.10 - 6.8.0-41.41 linux-image-oem-20.04 - 6.8.0-41.41 linux-image-oem-20.04b - 6.8.0-41.41 linux-image-oem-20.04c - 6.8.0-41.41 linux-image-oem-20.04d - 6.8.0-41.41 linux-image-oem-22.04 - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-uc-generic - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04 - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-virtual - 6.8.0-41.41 linux-image-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-kvm - 6.8.0-41.41 linux-laptop-23.10 - 6.8.0-41.41 linux-lib-rust-6.8.0-41-generic - 6.8.0-41.41 linux-libc-dev - 6.8.0-41.41 linux-modules-6.8.0-41-generic - 6.8.0-41.41 linux-modules-6.8.0-41-generic-64k - 6.8.0-41.41 linux-modules-extra-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-generic - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-6.8.0-41-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04 - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04d - 6.8.0-41.41 linux-modules-iwlwifi-oem-22.04 - 6.8.0-41.41 linux-modules-usbio-6.8.0-41-generic - 6.8.0-41.41 linux-modules-usbio-generic - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-41.41 linux-oem-20.04 - 6.8.0-41.41 linux-oem-20.04b - 6.8.0-41.41 linux-oem-20.04c - 6.8.0-41.41 linux-oem-20.04d - 6.8.0-41.41 linux-oem-22.04 - 6.8.0-41.41 linux-source - 6.8.0-41.41 linux-source-6.8.0 - 6.8.0-41.41 linux-tools-6.8.0-41 - 6.8.0-41.41 linux-tools-6.8.0-41-generic - 6.8.0-41.41 linux-tools-6.8.0-41-generic-64k - 6.8.0-41.41 linux-tools-common - 6.8.0-41.41 linux-tools-generic - 6.8.0-41.41 linux-tools-generic-64k - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-lpae - 6.8.0-41.41 linux-tools-host - 6.8.0-41.41 linux-tools-kvm - 6.8.0-41.41 linux-tools-laptop-23.10 - 6.8.0-41.41 linux-tools-oem-20.04 - 6.8.0-41.41 linux-tools-oem-20.04b - 6.8.0-41.41 linux-tools-oem-20.04c - 6.8.0-41.41 linux-tools-oem-20.04d - 6.8.0-41.41 linux-tools-oem-22.04 - 6.8.0-41.41 linux-tools-virtual - 6.8.0-41.41 linux-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-virtual - 6.8.0-41.41 linux-virtual-hwe-24.04 - 6.8.0-41.41 linux-virtual-hwe-24.04-edge - 6.8.0-41.41 No subscription required linux-buildinfo-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-buildinfo-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-cloud-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency - 6.8.0-41.41.1 linux-headers-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency - 6.8.0-41.41.1 linux-image-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency - 6.8.0-41.41.1 linux-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-common - 6.8.0-41.41.1 linux-lowlatency-headers-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-lib-rust-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-lowlatency-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-tools-common - 6.8.0-41.41.1 linux-lowlatency-tools-host - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-modules-iwlwifi-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency - 6.8.0-41.41.1 linux-tools-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 No subscription required
Medium
CVE-2024-39292
CVE-2024-39484
USN-6977-1 -- QEMU vulnerabilities
Ubuntu 24.04 LTS
It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26327) It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26328) Update Instructions: Run `sudo pro fix USN-6977-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.2 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.2 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.2 qemu-system - 1:8.2.2+ds-0ubuntu1.2 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.2 qemu-system-common - 1:8.2.2+ds-0ubuntu1.2 qemu-system-data - 1:8.2.2+ds-0ubuntu1.2 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.2 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.2 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.2 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.2 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-user - 1:8.2.2+ds-0ubuntu1.2 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.2 qemu-user-static - 1:8.2.2+ds-0ubuntu1.2 qemu-utils - 1:8.2.2+ds-0ubuntu1.2 No subscription required
Medium
CVE-2024-26327
CVE-2024-26328
USN-6982-1 -- Dovecot vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Dovecot did not not properly have restrictions on ithe size of address headers. A remote attacker could possibly use this issue to cause denial of service. (CVE-2024-23184, CVE-2024-23185) Update Instructions: Run `sudo pro fix USN-6982-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dovecot-auth-lua - 1:2.3.21+dfsg1-2ubuntu6 dovecot-core - 1:2.3.21+dfsg1-2ubuntu6 dovecot-dev - 1:2.3.21+dfsg1-2ubuntu6 dovecot-gssapi - 1:2.3.21+dfsg1-2ubuntu6 dovecot-imapd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-ldap - 1:2.3.21+dfsg1-2ubuntu6 dovecot-lmtpd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-managesieved - 1:2.3.21+dfsg1-2ubuntu6 dovecot-mysql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pgsql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pop3d - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sieve - 1:2.3.21+dfsg1-2ubuntu6 dovecot-solr - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sqlite - 1:2.3.21+dfsg1-2ubuntu6 dovecot-submissiond - 1:2.3.21+dfsg1-2ubuntu6 No subscription required
Medium
CVE-2024-23184
CVE-2024-23185
USN-6983-1 -- FFmpeg vulnerability
Ubuntu 24.04 LTS
Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during video encoding. An attacker could possibly use this issue to perform a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6983-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm2 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm2 libavcodec-dev - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm2 libavcodec60 - 7:6.1.1-3ubuntu5+esm2 libavdevice-dev - 7:6.1.1-3ubuntu5+esm2 libavdevice60 - 7:6.1.1-3ubuntu5+esm2 libavfilter-dev - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm2 libavfilter9 - 7:6.1.1-3ubuntu5+esm2 libavformat-dev - 7:6.1.1-3ubuntu5+esm2 libavformat-extra - 7:6.1.1-3ubuntu5+esm2 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm2 libavformat60 - 7:6.1.1-3ubuntu5+esm2 libavutil-dev - 7:6.1.1-3ubuntu5+esm2 libavutil58 - 7:6.1.1-3ubuntu5+esm2 libpostproc-dev - 7:6.1.1-3ubuntu5+esm2 libpostproc57 - 7:6.1.1-3ubuntu5+esm2 libswresample-dev - 7:6.1.1-3ubuntu5+esm2 libswresample4 - 7:6.1.1-3ubuntu5+esm2 libswscale-dev - 7:6.1.1-3ubuntu5+esm2 libswscale7 - 7:6.1.1-3ubuntu5+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-32230
USN-6984-1 -- WebOb vulnerability
Ubuntu 24.04 LTS
It was discovered that WebOb incorrectly handled certain URLs. An attacker could possibly use this issue to control a redirect or forward to another URL. Update Instructions: Run `sudo pro fix USN-6984-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-webob-doc - 1:1.8.7-1ubuntu0.1.24.04.1 python3-webob - 1:1.8.7-1ubuntu0.1.24.04.1 No subscription required
Medium
CVE-2024-42353
USN-6986-1 -- OpenSSL vulnerability
Ubuntu 24.04 LTS
David Benjamin discovered that OpenSSL incorrectly handled certain X.509 certificates. An attacker could possible use this issue to cause a denial of service or expose sensitive information. Update Instructions: Run `sudo pro fix USN-6986-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.4 libssl-doc - 3.0.13-0ubuntu3.4 libssl3t64 - 3.0.13-0ubuntu3.4 openssl - 3.0.13-0ubuntu3.4 No subscription required
Medium
CVE-2024-6119
USN-6987-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231) Update Instructions: Run `sudo pro fix USN-6987-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.3 python3-django - 3:4.2.11-1ubuntu1.3 No subscription required
Medium
CVE-2024-45230
CVE-2024-45231
USN-6988-1 -- Twisted vulnerabilities
Ubuntu 24.04 LTS
Ben Kallus discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay and manipulate responses. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-41671) It was discovered that Twisted did not properly sanitize certain input. An attacker could use this vulnerability to possibly execute an HTML injection leading to a cross-site scripting (XSS) attack. (CVE-2024-41810) Update Instructions: Run `sudo pro fix USN-6988-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 24.3.0-1ubuntu0.1 twisted-doc - 24.3.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-41671
CVE-2024-41810
USN-6989-1 -- OpenStack vulnerability
Ubuntu 24.04 LTS
Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. Update Instructions: Run `sudo pro fix USN-6989-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ironic-api - 1:24.1.1-0ubuntu1.2 ironic-common - 1:24.1.1-0ubuntu1.2 ironic-conductor - 1:24.1.1-0ubuntu1.2 python3-ironic - 1:24.1.1-0ubuntu1.2 No subscription required
Medium
CVE-2024-44082
USN-6990-1 -- znc vulnerability
Ubuntu 24.04 LTS
Johannes Kuhn (DasBrain) discovered that znc incorrectly handled user input under certain operations. An attacker could possibly use this issue to execute arbitrary code on a user's system if the user was tricked into joining a malicious server. Update Instructions: Run `sudo pro fix USN-6990-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: znc-backlog - 0.20180824+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc-push - 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc - 1.9.0-2ubuntu0.1~esm2 znc-dev - 1.9.0-2ubuntu0.1~esm2 znc-perl - 1.9.0-2ubuntu0.1~esm2 znc-python - 1.9.0-2ubuntu0.1~esm2 znc-tcl - 1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-39844
USN-6991-1 -- AIOHTTP vulnerability
Ubuntu 24.04 LTS
It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system. Update Instructions: Run `sudo pro fix USN-6991-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-aiohttp-doc - 3.9.1-1ubuntu0.1 python3-aiohttp - 3.9.1-1ubuntu0.1 No subscription required
Medium
CVE-2024-23334
USN-6993-1 -- Vim vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374) Update Instructions: Run `sudo pro fix USN-6993-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.2 vim-athena - 2:9.1.0016-1ubuntu7.2 vim-common - 2:9.1.0016-1ubuntu7.2 vim-doc - 2:9.1.0016-1ubuntu7.2 vim-gtk3 - 2:9.1.0016-1ubuntu7.2 vim-gui-common - 2:9.1.0016-1ubuntu7.2 vim-motif - 2:9.1.0016-1ubuntu7.2 vim-nox - 2:9.1.0016-1ubuntu7.2 vim-runtime - 2:9.1.0016-1ubuntu7.2 vim-tiny - 2:9.1.0016-1ubuntu7.2 xxd - 2:9.1.0016-1ubuntu7.2 No subscription required
Medium
CVE-2024-41957
CVE-2024-43374
USN-6996-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6996-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.3-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-40776
CVE-2024-40779
CVE-2024-40780
CVE-2024-40782
CVE-2024-40789
CVE-2024-4558
USN-6997-1 -- LibTIFF vulnerability
Ubuntu 24.04 LTS
It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6997-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-4ubuntu2.2 libtiff-doc - 4.5.1+git230720-4ubuntu2.2 libtiff-opengl - 4.5.1+git230720-4ubuntu2.2 libtiff-tools - 4.5.1+git230720-4ubuntu2.2 libtiff5-dev - 4.5.1+git230720-4ubuntu2.2 libtiff6 - 4.5.1+git230720-4ubuntu2.2 libtiffxx6 - 4.5.1+git230720-4ubuntu2.2 No subscription required
Medium
CVE-2024-7006
USN-6998-1 -- Unbound vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-43167) It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-43168) Update Instructions: Run `sudo pro fix USN-6998-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.2 libunbound8 - 1.19.2-1ubuntu3.2 python3-unbound - 1.19.2-1ubuntu3.2 unbound - 1.19.2-1ubuntu3.2 unbound-anchor - 1.19.2-1ubuntu3.2 unbound-host - 1.19.2-1ubuntu3.2 No subscription required
Medium
CVE-2024-43167
CVE-2024-43168
USN-6999-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40911, CVE-2024-37356, CVE-2024-40935, CVE-2024-40944, CVE-2024-41003, CVE-2024-40990, CVE-2024-40952, CVE-2024-40940, CVE-2024-40930, CVE-2024-40985, CVE-2024-40941, CVE-2024-38630, CVE-2024-39466, CVE-2024-40933, CVE-2024-38624, CVE-2024-40924, CVE-2024-40945, CVE-2024-40899, CVE-2024-38622, CVE-2024-40979, CVE-2024-36484, CVE-2024-41004, CVE-2024-39474, CVE-2022-48772, CVE-2024-36244, CVE-2024-38664, CVE-2024-40925, CVE-2024-40980, CVE-2024-39480, CVE-2024-36270, CVE-2024-40936, CVE-2024-40904, CVE-2024-38635, CVE-2024-40927, CVE-2024-36481, CVE-2024-40929, CVE-2024-40958, CVE-2024-36978, CVE-2024-40992, CVE-2024-40908, CVE-2024-39504, CVE-2024-41001, CVE-2024-40967, CVE-2023-52884, CVE-2024-40997, CVE-2024-40903, CVE-2024-40913, CVE-2024-34030, CVE-2024-39473, CVE-2024-40966, CVE-2024-40951, CVE-2024-40902, CVE-2024-40982, CVE-2024-40923, CVE-2024-39467, CVE-2024-40910, CVE-2024-40909, CVE-2024-39463, CVE-2024-40974, CVE-2024-41002, CVE-2024-39464, CVE-2024-39496, CVE-2024-41040, CVE-2024-39469, CVE-2024-39500, CVE-2024-39510, CVE-2024-38627, CVE-2024-32936, CVE-2024-40975, CVE-2024-38390, CVE-2024-40959, CVE-2024-41006, CVE-2024-40986, CVE-2024-40987, CVE-2024-40922, CVE-2024-40983, CVE-2024-37354, CVE-2024-38637, CVE-2024-39277, CVE-2024-40943, CVE-2024-39371, CVE-2024-40921, CVE-2024-40953, CVE-2024-38634, CVE-2024-38659, CVE-2024-39492, CVE-2024-40976, CVE-2024-40906, CVE-2024-40965, CVE-2024-38667, CVE-2024-39498, CVE-2024-38628, CVE-2024-38661, CVE-2024-38663, CVE-2024-40998, CVE-2024-40948, CVE-2024-38306, CVE-2024-40928, CVE-2024-39468, CVE-2024-39494, CVE-2024-39505, CVE-2024-40963, CVE-2024-39499, CVE-2024-39506, CVE-2024-40995, CVE-2024-39491, CVE-2024-40900, CVE-2024-39478, CVE-2024-39490, CVE-2024-39291, CVE-2024-40981, CVE-2024-40926, CVE-2024-40939, CVE-2024-38385, CVE-2024-39483, CVE-2024-40989, CVE-2024-40955, CVE-2024-39501, CVE-2024-38381, CVE-2024-33621, CVE-2024-40964, CVE-2024-42148, CVE-2024-36286, CVE-2024-38629, CVE-2024-39509, CVE-2024-39298, CVE-2024-36489, CVE-2024-34777, CVE-2024-40957, CVE-2024-40919, CVE-2024-39462, CVE-2024-39495, CVE-2024-39497, CVE-2024-38636, CVE-2024-36281, CVE-2024-39479, CVE-2024-40932, CVE-2024-36288, CVE-2024-38623, CVE-2024-40969, CVE-2024-40931, CVE-2024-36971, CVE-2024-40934, CVE-2024-36015, CVE-2024-39485, CVE-2024-40996, CVE-2024-39507, CVE-2024-36973, CVE-2024-38625, CVE-2024-39301, CVE-2024-34027, CVE-2024-37026, CVE-2024-40960, CVE-2024-37078, CVE-2024-40912, CVE-2024-40988, CVE-2024-41005, CVE-2024-39276, CVE-2024-38662, CVE-2024-39502, CVE-2024-36479, CVE-2024-40947, CVE-2024-38780, CVE-2024-38388, CVE-2024-40917, CVE-2024-36974, CVE-2024-40970, CVE-2024-40901, CVE-2024-38384, CVE-2024-39475, CVE-2024-40949, CVE-2024-37021, CVE-2024-38633, CVE-2024-39503, CVE-2024-41000, CVE-2024-33847, CVE-2024-35247, CVE-2024-40968, CVE-2024-33619, CVE-2024-38619, CVE-2024-40984, CVE-2024-36478, CVE-2024-39493, CVE-2024-42078, CVE-2024-40954, CVE-2024-40978, CVE-2024-39508, CVE-2024-40915, CVE-2024-39489, CVE-2024-40920, CVE-2024-38618, CVE-2024-40938, CVE-2024-39296, CVE-2024-40962, CVE-2024-39470, CVE-2024-39481, CVE-2024-40977, CVE-2024-38621, CVE-2024-40971, CVE-2024-31076, CVE-2024-36972, CVE-2024-39471, CVE-2024-40994, CVE-2024-40973, CVE-2024-40916, CVE-2024-40942, CVE-2024-40956, CVE-2024-39465, CVE-2024-40914, CVE-2024-40937, CVE-2024-40918, CVE-2024-40905, CVE-2024-39488, CVE-2024-38632, CVE-2024-39461, CVE-2024-40999, CVE-2024-40972, CVE-2024-36477, CVE-2024-40961) Update Instructions: Run `sudo pro fix USN-6999-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gke - 6.8.0-1010.13 linux-gke - 6.8.0-1010.13 linux-gke-headers-6.8.0-1010 - 6.8.0-1010.13 linux-gke-tools-6.8.0-1010 - 6.8.0-1010.13 linux-headers-6.8.0-1010-gke - 6.8.0-1010.13 linux-headers-gke - 6.8.0-1010.13 linux-image-6.8.0-1010-gke - 6.8.0-1010.13 linux-image-gke - 6.8.0-1010.13 linux-image-unsigned-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-extra-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-gke - 6.8.0-1010.13 linux-tools-6.8.0-1010-gke - 6.8.0-1010.13 linux-tools-gke - 6.8.0-1010.13 No subscription required linux-buildinfo-6.8.0-1012-ibm - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oem - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-6.8.0-1012-ibm - 6.8.0-1012.12 linux-headers-6.8.0-1012-oem - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-ibm - 6.8.0-1012.12 linux-headers-ibm-classic - 6.8.0-1012.12 linux-headers-ibm-lts-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04a - 6.8.0-1012.12 linux-headers-oracle - 6.8.0-1012.12 linux-headers-oracle-64k - 6.8.0-1012.12 linux-ibm - 6.8.0-1012.12 linux-ibm-classic - 6.8.0-1012.12 linux-ibm-cloud-tools-common - 6.8.0-1012.12 linux-ibm-headers-6.8.0-1012 - 6.8.0-1012.12 linux-ibm-lts-24.04 - 6.8.0-1012.12 linux-ibm-source-6.8.0 - 6.8.0-1012.12 linux-ibm-tools-6.8.0-1012 - 6.8.0-1012.12 linux-image-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-image-ibm - 6.8.0-1012.12 linux-image-ibm-classic - 6.8.0-1012.12 linux-image-ibm-lts-24.04 - 6.8.0-1012.12 linux-image-oem-24.04 - 6.8.0-1012.12 linux-image-oem-24.04a - 6.8.0-1012.12 linux-image-oracle - 6.8.0-1012.12 linux-image-oracle-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-uc-oem-24.04 - 6.8.0-1012.12 linux-image-uc-oem-24.04a - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-ipu6-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04 - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-iwlwifi-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-classic - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-oracle - 6.8.0-1012.12 linux-modules-usbio-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-usbio-oem-24.04 - 6.8.0-1012.12 linux-modules-usbio-oem-24.04a - 6.8.0-1012.12 linux-oem-24.04 - 6.8.0-1012.12 linux-oem-24.04a - 6.8.0-1012.12 linux-oem-6.8-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oem-6.8-tools-6.8.0-1012 - 6.8.0-1012.12 linux-oracle - 6.8.0-1012.12 linux-oracle-64k - 6.8.0-1012.12 linux-oracle-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oracle-tools-6.8.0-1012 - 6.8.0-1012.12 linux-tools-6.8.0-1012-ibm - 6.8.0-1012.12 linux-tools-6.8.0-1012-oem - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-tools-ibm - 6.8.0-1012.12 linux-tools-ibm-classic - 6.8.0-1012.12 linux-tools-ibm-lts-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04a - 6.8.0-1012.12 linux-tools-oracle - 6.8.0-1012.12 linux-tools-oracle-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1014-gcp - 6.8.0-1014.16 linux-gcp - 6.8.0-1014.16 linux-gcp-headers-6.8.0-1014 - 6.8.0-1014.16 linux-gcp-tools-6.8.0-1014 - 6.8.0-1014.16 linux-headers-6.8.0-1014-gcp - 6.8.0-1014.16 linux-headers-gcp - 6.8.0-1014.16 linux-image-6.8.0-1014-gcp - 6.8.0-1014.16 linux-image-gcp - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-gcp - 6.8.0-1014.16 linux-tools-6.8.0-1014-gcp - 6.8.0-1014.16 linux-tools-gcp - 6.8.0-1014.16 No subscription required linux-aws - 6.8.0-1015.16 linux-aws-cloud-tools-6.8.0-1015 - 6.8.0-1015.16 linux-aws-headers-6.8.0-1015 - 6.8.0-1015.16 linux-aws-tools-6.8.0-1015 - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-aws - 6.8.0-1015.16 linux-cloud-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-aws - 6.8.0-1015.16 linux-image-6.8.0-1015-aws - 6.8.0-1015.16 linux-image-aws - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-aws - 6.8.0-1015.16 linux-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-tools-aws - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-44-generic - 6.8.0-44.44 linux-buildinfo-6.8.0-44-generic-64k - 6.8.0-44.44 linux-cloud-tools-6.8.0-44 - 6.8.0-44.44 linux-cloud-tools-6.8.0-44-generic - 6.8.0-44.44 linux-cloud-tools-common - 6.8.0-44.44 linux-cloud-tools-generic - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-cloud-tools-virtual - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-crashdump - 6.8.0-44.44 linux-doc - 6.8.0-44.44 linux-generic - 6.8.0-44.44 linux-generic-64k - 6.8.0-44.44 linux-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-generic-hwe-24.04 - 6.8.0-44.44 linux-generic-hwe-24.04-edge - 6.8.0-44.44 linux-generic-lpae - 6.8.0-44.44 linux-headers-6.8.0-44 - 6.8.0-44.44 linux-headers-6.8.0-44-generic - 6.8.0-44.44 linux-headers-6.8.0-44-generic-64k - 6.8.0-44.44 linux-headers-generic - 6.8.0-44.44 linux-headers-generic-64k - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-lpae - 6.8.0-44.44 linux-headers-kvm - 6.8.0-44.44 linux-headers-laptop-23.10 - 6.8.0-44.44 linux-headers-oem-20.04 - 6.8.0-44.44 linux-headers-oem-20.04b - 6.8.0-44.44 linux-headers-oem-20.04c - 6.8.0-44.44 linux-headers-oem-20.04d - 6.8.0-44.44 linux-headers-oem-22.04 - 6.8.0-44.44 linux-headers-virtual - 6.8.0-44.44 linux-headers-virtual-hwe-24.04 - 6.8.0-44.44 linux-headers-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-6.8.0-44-generic - 6.8.0-44.44 linux-image-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-extra-virtual - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic - 6.8.0-44.44 linux-image-generic-64k - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-hwe-24.04 - 6.8.0-44.44 linux-image-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-lpae - 6.8.0-44.44 linux-image-kvm - 6.8.0-44.44 linux-image-laptop-23.10 - 6.8.0-44.44 linux-image-oem-20.04 - 6.8.0-44.44 linux-image-oem-20.04b - 6.8.0-44.44 linux-image-oem-20.04c - 6.8.0-44.44 linux-image-oem-20.04d - 6.8.0-44.44 linux-image-oem-22.04 - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-uc-generic - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04 - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-virtual - 6.8.0-44.44 linux-image-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-kvm - 6.8.0-44.44 linux-laptop-23.10 - 6.8.0-44.44 linux-lib-rust-6.8.0-44-generic - 6.8.0-44.44 linux-libc-dev - 6.8.0-44.44 linux-modules-6.8.0-44-generic - 6.8.0-44.44 linux-modules-6.8.0-44-generic-64k - 6.8.0-44.44 linux-modules-extra-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-generic - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-6.8.0-44-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04 - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04d - 6.8.0-44.44 linux-modules-iwlwifi-oem-22.04 - 6.8.0-44.44 linux-modules-usbio-6.8.0-44-generic - 6.8.0-44.44 linux-modules-usbio-generic - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-44.44 linux-oem-20.04 - 6.8.0-44.44 linux-oem-20.04b - 6.8.0-44.44 linux-oem-20.04c - 6.8.0-44.44 linux-oem-20.04d - 6.8.0-44.44 linux-oem-22.04 - 6.8.0-44.44 linux-source - 6.8.0-44.44 linux-source-6.8.0 - 6.8.0-44.44 linux-tools-6.8.0-44 - 6.8.0-44.44 linux-tools-6.8.0-44-generic - 6.8.0-44.44 linux-tools-6.8.0-44-generic-64k - 6.8.0-44.44 linux-tools-common - 6.8.0-44.44 linux-tools-generic - 6.8.0-44.44 linux-tools-generic-64k - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-lpae - 6.8.0-44.44 linux-tools-host - 6.8.0-44.44 linux-tools-kvm - 6.8.0-44.44 linux-tools-laptop-23.10 - 6.8.0-44.44 linux-tools-oem-20.04 - 6.8.0-44.44 linux-tools-oem-20.04b - 6.8.0-44.44 linux-tools-oem-20.04c - 6.8.0-44.44 linux-tools-oem-20.04d - 6.8.0-44.44 linux-tools-oem-22.04 - 6.8.0-44.44 linux-tools-virtual - 6.8.0-44.44 linux-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-virtual - 6.8.0-44.44 linux-virtual-hwe-24.04 - 6.8.0-44.44 linux-virtual-hwe-24.04-edge - 6.8.0-44.44 No subscription required linux-buildinfo-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-buildinfo-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-cloud-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency - 6.8.0-44.44.1 linux-headers-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency - 6.8.0-44.44.1 linux-image-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency - 6.8.0-44.44.1 linux-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-common - 6.8.0-44.44.1 linux-lowlatency-headers-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-lib-rust-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-lowlatency-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-tools-common - 6.8.0-44.44.1 linux-lowlatency-tools-host - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-modules-iwlwifi-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency - 6.8.0-44.44.1 linux-tools-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-6999-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40978, CVE-2024-39504, CVE-2024-39483, CVE-2024-36478, CVE-2024-40928, CVE-2024-36971, CVE-2024-40947, CVE-2024-31076, CVE-2024-40934, CVE-2024-40909, CVE-2024-40962, CVE-2024-38635, CVE-2024-38632, CVE-2024-40912, CVE-2024-40967, CVE-2024-39492, CVE-2024-40974, CVE-2024-39466, CVE-2024-40939, CVE-2024-40988, CVE-2024-40951, CVE-2024-41005, CVE-2024-40968, CVE-2024-39493, CVE-2024-40949, CVE-2022-48772, CVE-2024-40944, CVE-2024-40998, CVE-2024-39490, CVE-2024-39467, CVE-2024-42078, CVE-2024-40953, CVE-2024-40990, CVE-2024-40902, CVE-2024-39461, CVE-2024-39301, CVE-2024-36978, CVE-2024-39475, CVE-2024-39496, CVE-2024-40901, CVE-2024-40985, CVE-2024-33621, CVE-2024-38663, CVE-2024-39497, CVE-2024-40937, CVE-2024-40941, CVE-2024-40987, CVE-2024-40918, CVE-2024-32936, CVE-2024-40999, CVE-2024-40938, CVE-2024-39488, CVE-2024-39510, CVE-2024-40924, CVE-2024-38661, CVE-2024-40989, CVE-2024-39509, CVE-2024-40983, CVE-2024-39471, CVE-2024-39502, CVE-2024-39508, CVE-2024-39371, CVE-2024-40982, CVE-2024-40910, CVE-2024-40903, CVE-2024-39296, CVE-2024-39507, CVE-2024-40906, CVE-2024-37354, CVE-2024-40905, CVE-2024-34027, CVE-2024-38618, CVE-2024-40900, CVE-2024-39469, CVE-2024-38662, CVE-2024-35247, CVE-2024-40922, CVE-2024-40926, CVE-2024-39503, CVE-2024-40899, CVE-2024-40977, CVE-2024-38634, CVE-2024-40933, CVE-2024-40992, CVE-2024-40904, CVE-2024-36479, CVE-2024-40996, CVE-2024-40957, CVE-2024-40931, CVE-2024-39291, CVE-2024-38780, CVE-2024-39277, CVE-2024-38628, CVE-2024-40932, CVE-2024-41004, CVE-2024-33847, CVE-2024-40972, CVE-2024-40945, CVE-2023-52884, CVE-2024-38664, CVE-2024-39462, CVE-2024-40965, CVE-2024-38388, CVE-2024-40916, CVE-2024-36489, CVE-2024-40975, CVE-2024-40942, CVE-2024-40995, CVE-2024-40997, CVE-2024-38385, CVE-2024-40911, CVE-2024-39474, CVE-2024-39470, CVE-2024-41000, CVE-2024-36015, CVE-2024-38633, CVE-2024-40943, CVE-2024-39489, CVE-2024-36477, CVE-2024-39491, CVE-2024-40919, CVE-2024-40914, CVE-2024-40966, CVE-2024-41002, CVE-2024-40960, CVE-2024-38624, CVE-2024-40964, CVE-2024-40936, CVE-2024-40913, CVE-2024-40955, CVE-2024-37026, CVE-2024-38384, CVE-2024-37078, CVE-2024-36244, CVE-2024-38622, CVE-2024-39485, CVE-2024-39479, CVE-2024-39505, CVE-2024-36973, CVE-2024-39498, CVE-2024-40908, CVE-2024-37356, CVE-2024-39480, CVE-2024-38381, CVE-2024-40940, CVE-2024-40980, CVE-2024-39276, CVE-2024-39499, CVE-2024-36484, CVE-2024-38636, CVE-2024-38390, CVE-2024-38619, CVE-2024-39478, CVE-2024-40959, CVE-2024-36288, CVE-2024-40935, CVE-2024-41006, CVE-2024-38625, CVE-2024-36972, CVE-2024-39298, CVE-2024-39468, CVE-2024-40970, CVE-2024-37021, CVE-2024-40981, CVE-2024-40921, CVE-2024-34777, CVE-2024-39500, CVE-2024-40927, CVE-2024-40979, CVE-2024-38627, CVE-2024-39501, CVE-2024-39481, CVE-2024-40917, CVE-2024-40956, CVE-2024-42148, CVE-2024-36481, CVE-2024-40925, CVE-2024-40986, CVE-2024-40948, CVE-2024-41003, CVE-2024-39506, CVE-2024-40952, CVE-2024-38306, CVE-2024-40971, CVE-2024-41001, CVE-2024-40973, CVE-2024-36281, CVE-2024-40923, CVE-2024-39473, CVE-2024-38637, CVE-2024-40984, CVE-2024-39463, CVE-2024-41040, CVE-2024-38623, CVE-2024-40954, CVE-2024-36286, CVE-2024-38667, CVE-2024-39465, CVE-2024-40915, CVE-2024-33619, CVE-2024-40920, CVE-2024-40969, CVE-2024-38659, CVE-2024-34030, CVE-2024-38630, CVE-2024-40976, CVE-2024-36974, CVE-2024-40930, CVE-2024-39464, CVE-2024-38621, CVE-2024-40958, CVE-2024-40994, CVE-2024-39494, CVE-2024-40961, CVE-2024-39495, CVE-2024-40963, CVE-2024-36270, CVE-2024-38629, CVE-2024-40929) Update Instructions: Run `sudo pro fix USN-6999-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-raspi - 6.8.0-1011.12 linux-image-6.8.0-1011-raspi - 6.8.0-1011.12 linux-image-raspi - 6.8.0-1011.12 linux-modules-6.8.0-1011-raspi - 6.8.0-1011.12 linux-raspi - 6.8.0-1011.12 linux-raspi-headers-6.8.0-1011 - 6.8.0-1011.12 linux-raspi-tools-6.8.0-1011 - 6.8.0-1011.12 linux-tools-6.8.0-1011-raspi - 6.8.0-1011.12 linux-tools-raspi - 6.8.0-1011.12 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-7000-1 -- Expat vulnerabilities
Ubuntu 24.04 LTS
Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491, CVE-2024-45492) Update Instructions: Run `sudo pro fix USN-7000-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.1 libexpat1 - 2.6.1-2ubuntu0.1 libexpat1-dev - 2.6.1-2ubuntu0.1 No subscription required
Medium
CVE-2024-45490
CVE-2024-45491
CVE-2024-45492
USN-7001-2 -- xmltok library vulnerabilities
Ubuntu 24.04 LTS
USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491) Update Instructions: Run `sudo pro fix USN-7001-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm1 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-45490
CVE-2024-45491
USN-7002-1 -- Setuptools vulnerability
Ubuntu 24.04 LTS
It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7002-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.1 python3-pkg-resources - 68.1.2-2ubuntu1.1 python3-setuptools - 68.1.2-2ubuntu1.1 python3-setuptools-whl - 68.1.2-2ubuntu1.1 No subscription required
Medium
CVE-2024-6345
USN-7004-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-36270, CVE-2024-38627, CVE-2024-39508, CVE-2024-41001, CVE-2024-38634, CVE-2024-40979, CVE-2024-40903, CVE-2024-34030, CVE-2024-38621, CVE-2024-34027, CVE-2024-39504, CVE-2024-38385, CVE-2024-36288, CVE-2024-39301, CVE-2024-38628, CVE-2024-42270, CVE-2024-39507, CVE-2024-36286, CVE-2024-40960, CVE-2024-36479, CVE-2024-41002, CVE-2024-36974, CVE-2024-40943, CVE-2024-40976, CVE-2024-38662, CVE-2024-40995, CVE-2024-39497, CVE-2024-31076, CVE-2024-39371, CVE-2024-40983, CVE-2024-40985, CVE-2024-38618, CVE-2024-40914, CVE-2024-40989, CVE-2024-40973, CVE-2024-38663, CVE-2024-39463, CVE-2024-38633, CVE-2024-36978, CVE-2024-40970, CVE-2024-40932, CVE-2024-39480, CVE-2024-39471, CVE-2024-40962, CVE-2024-40986, CVE-2024-40937, CVE-2024-39469, CVE-2024-40904, CVE-2024-39466, CVE-2024-38388, CVE-2024-39494, CVE-2024-41004, CVE-2024-38381, CVE-2022-48772, CVE-2024-33847, CVE-2024-40969, CVE-2024-40957, CVE-2024-40933, CVE-2024-37354, CVE-2024-39468, CVE-2024-40917, CVE-2024-38623, CVE-2024-40958, CVE-2024-39502, CVE-2024-38384, CVE-2024-39506, CVE-2024-40940, CVE-2024-34777, CVE-2024-41005, CVE-2024-39470, CVE-2024-39464, CVE-2024-39492, CVE-2024-38629, CVE-2024-39505, CVE-2024-40952, CVE-2024-40941, CVE-2024-39474, CVE-2024-38664, CVE-2024-40929, CVE-2024-39489, CVE-2024-40953, CVE-2024-40916, CVE-2024-40911, CVE-2024-32936, CVE-2024-40934, CVE-2024-37078, CVE-2024-39483, CVE-2024-40967, CVE-2024-40924, CVE-2024-39462, CVE-2024-40981, CVE-2024-36281, CVE-2024-39291, CVE-2024-39481, CVE-2024-40978, CVE-2024-38622, CVE-2024-39503, CVE-2024-40956, CVE-2023-52884, CVE-2024-39498, CVE-2024-38661, CVE-2024-40918, CVE-2024-39479, CVE-2024-40915, CVE-2024-39501, CVE-2024-39488, CVE-2024-40925, CVE-2024-40930, CVE-2024-40961, CVE-2024-40951, CVE-2024-38636, CVE-2024-39491, CVE-2024-39495, CVE-2024-39509, CVE-2024-40947, CVE-2024-36477, CVE-2024-36478, CVE-2024-42148, CVE-2024-39473, CVE-2024-39510, CVE-2024-40923, CVE-2024-38624, CVE-2024-38659, CVE-2024-36971, CVE-2024-38625, CVE-2024-40913, CVE-2024-35247, CVE-2024-36481, CVE-2024-36484, CVE-2024-40928, CVE-2024-40927, CVE-2024-40944, CVE-2024-39485, CVE-2024-36244, CVE-2024-40910, CVE-2024-40945, CVE-2024-33621, CVE-2024-38667, CVE-2024-40992, CVE-2024-40908, CVE-2024-40901, CVE-2024-40906, CVE-2024-38390, CVE-2024-40900, CVE-2024-41006, CVE-2024-40968, CVE-2024-40966, CVE-2024-40977, CVE-2024-33619, CVE-2024-39496, CVE-2024-38630, CVE-2024-40920, CVE-2024-39499, CVE-2024-40899, CVE-2024-41003, CVE-2024-40964, CVE-2024-40922, CVE-2024-38632, CVE-2024-40931, CVE-2024-40982, CVE-2024-40971, CVE-2024-39277, CVE-2024-39467, CVE-2024-36015, CVE-2024-40954, CVE-2024-40938, CVE-2024-40921, CVE-2024-39296, CVE-2024-41040, CVE-2024-40965, CVE-2024-39465, CVE-2024-40984, CVE-2024-39478, CVE-2024-40990, CVE-2024-40926, CVE-2024-40980, CVE-2024-40905, CVE-2024-39475, CVE-2024-40959, CVE-2024-40902, CVE-2024-38780, CVE-2024-40935, CVE-2024-37021, CVE-2024-40997, CVE-2024-40936, CVE-2024-40987, CVE-2024-40939, CVE-2024-37026, CVE-2024-36973, CVE-2024-40972, CVE-2024-42078, CVE-2024-38306, CVE-2024-40949, CVE-2024-36489, CVE-2024-38637, CVE-2024-40912, CVE-2024-39276, CVE-2024-39493, CVE-2024-40994, CVE-2024-40948, CVE-2024-36972, CVE-2024-40942, CVE-2024-37356, CVE-2024-38619, CVE-2024-40988, CVE-2024-38635, CVE-2024-41000, CVE-2024-40955, CVE-2024-40999, CVE-2024-40974, CVE-2024-39490, CVE-2024-39298, CVE-2024-40975, CVE-2024-40998, CVE-2024-40996, CVE-2024-40963, CVE-2024-40909, CVE-2024-40919, CVE-2024-39500, CVE-2024-39461) Update Instructions: Run `sudo pro fix USN-7004-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1014.16 linux-azure-cloud-tools-6.8.0-1014 - 6.8.0-1014.16 linux-azure-fde - 6.8.0-1014.16 linux-azure-headers-6.8.0-1014 - 6.8.0-1014.16 linux-azure-tools-6.8.0-1014 - 6.8.0-1014.16 linux-buildinfo-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-azure - 6.8.0-1014.16 linux-headers-6.8.0-1014-azure - 6.8.0-1014.16 linux-headers-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure-fde - 6.8.0-1014.16 linux-image-azure - 6.8.0-1014.16 linux-image-azure-fde - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-azure - 6.8.0-1014.16 linux-modules-involflt-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-involflt-azure - 6.8.0-1014.16 linux-modules-iwlwifi-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-iwlwifi-azure - 6.8.0-1014.16 linux-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-tools-azure - 6.8.0-1014.16 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
CVE-2024-42270
USN-7005-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40963, CVE-2024-40994, CVE-2024-36481, CVE-2024-39301, CVE-2024-38390, CVE-2024-40976, CVE-2024-40934, CVE-2024-40902, CVE-2024-40916, CVE-2024-39298, CVE-2024-38659, CVE-2024-38384, CVE-2024-38635, CVE-2024-39494, CVE-2024-40926, CVE-2024-40956, CVE-2024-40948, CVE-2024-40920, CVE-2024-38624, CVE-2024-39498, CVE-2024-38780, CVE-2024-39503, CVE-2024-40919, CVE-2024-39505, CVE-2024-40988, CVE-2024-36972, CVE-2024-36974, CVE-2024-39495, CVE-2024-40992, CVE-2024-36015, CVE-2024-38618, CVE-2024-39478, CVE-2024-40975, CVE-2024-39507, CVE-2024-39479, CVE-2024-39291, CVE-2024-40925, CVE-2024-39493, CVE-2024-41005, CVE-2024-40932, CVE-2024-39467, CVE-2024-40973, CVE-2024-38634, CVE-2024-34027, CVE-2024-39462, CVE-2024-40949, CVE-2024-40908, CVE-2024-40929, CVE-2024-38662, CVE-2024-39489, CVE-2024-40953, CVE-2024-38306, CVE-2024-40915, CVE-2024-39470, CVE-2024-40969, CVE-2024-31076, CVE-2024-38663, CVE-2024-38629, CVE-2024-38633, CVE-2024-40959, CVE-2024-39475, CVE-2024-40947, CVE-2024-40971, CVE-2024-40979, CVE-2024-40996, CVE-2024-36484, CVE-2024-40960, CVE-2022-48772, CVE-2024-33619, CVE-2024-40923, CVE-2024-41006, CVE-2024-39474, CVE-2024-40944, CVE-2024-39473, CVE-2024-39469, CVE-2024-40914, CVE-2024-40900, CVE-2023-52884, CVE-2024-40931, CVE-2024-38664, CVE-2024-41004, CVE-2024-38636, CVE-2024-41001, CVE-2024-39497, CVE-2024-40974, CVE-2024-42078, CVE-2024-40954, CVE-2024-39483, CVE-2024-40978, CVE-2024-40952, CVE-2024-39481, CVE-2024-40955, CVE-2024-39471, CVE-2024-41000, CVE-2024-40972, CVE-2024-40957, CVE-2024-40913, CVE-2024-36478, CVE-2024-40984, CVE-2024-40990, CVE-2024-39510, CVE-2024-38381, CVE-2024-39277, CVE-2024-39464, CVE-2024-40995, CVE-2024-40905, CVE-2024-40986, CVE-2024-36971, CVE-2024-39480, CVE-2024-40938, CVE-2024-39509, CVE-2024-40982, CVE-2024-39500, CVE-2024-37026, CVE-2024-40965, CVE-2024-40961, CVE-2024-40989, CVE-2024-36973, CVE-2024-39504, CVE-2024-37354, CVE-2024-39488, CVE-2024-38661, CVE-2024-40998, CVE-2024-36489, CVE-2024-37021, CVE-2024-40917, CVE-2024-36281, CVE-2024-40964, CVE-2024-39496, CVE-2024-40980, CVE-2024-39465, CVE-2024-40983, CVE-2024-40936, CVE-2024-40899, CVE-2024-40933, CVE-2024-36288, CVE-2024-36286, CVE-2024-40987, CVE-2024-40939, CVE-2024-38667, CVE-2024-38628, CVE-2024-40977, CVE-2024-39276, CVE-2024-40941, CVE-2024-39491, CVE-2024-37078, CVE-2024-36978, CVE-2024-38623, CVE-2024-40962, CVE-2024-40935, CVE-2024-40997, CVE-2024-40981, CVE-2024-40922, CVE-2024-39461, CVE-2024-40999, CVE-2024-40918, CVE-2024-40927, CVE-2024-42148, CVE-2024-39371, CVE-2024-40985, CVE-2024-34030, CVE-2024-39485, CVE-2024-39296, CVE-2024-39466, CVE-2024-40909, CVE-2024-39492, CVE-2024-39502, CVE-2024-40903, CVE-2024-41040, CVE-2024-40968, CVE-2024-41003, CVE-2024-39499, CVE-2024-39508, CVE-2024-34777, CVE-2024-38627, CVE-2024-40930, CVE-2024-38388, CVE-2024-39490, CVE-2024-40906, CVE-2024-40940, CVE-2024-40937, CVE-2024-40911, CVE-2024-38385, CVE-2024-36244, CVE-2024-38622, CVE-2024-40958, CVE-2024-41002, CVE-2024-38621, CVE-2024-40970, CVE-2024-40904, CVE-2024-40928, CVE-2024-40967, CVE-2024-40951, CVE-2024-38637, CVE-2024-37356, CVE-2024-39463, CVE-2024-40912, CVE-2024-33847, CVE-2024-39468, CVE-2024-40942, CVE-2024-40910, CVE-2024-38625, CVE-2024-35247, CVE-2024-36479, CVE-2024-40943, CVE-2024-32936, CVE-2024-38630, CVE-2024-39501, CVE-2024-40966, CVE-2024-40921, CVE-2024-40924, CVE-2024-39506, CVE-2024-36270, CVE-2024-33621, CVE-2024-40945, CVE-2024-40901, CVE-2024-38632, CVE-2024-38619) Update Instructions: Run `sudo pro fix USN-7005-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-cloud-tools-nvidia - 6.8.0-1013.13 linux-headers-nvidia - 6.8.0-1013.13 linux-headers-nvidia-64k - 6.8.0-1013.13 linux-image-nvidia - 6.8.0-1013.13 linux-image-nvidia-64k - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1013.13 linux-nvidia - 6.8.0-1013.13 linux-nvidia-64k - 6.8.0-1013.13 linux-tools-nvidia - 6.8.0-1013.13 linux-tools-nvidia-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-nvidia-headers-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-host - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-extra-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency - 6.8.0-1013.14.1 linux-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency-headers-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1013.14.1 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-7010-1 -- DCMTK vulnerabilities
Ubuntu 24.04 LTS
Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-43272) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-28130) It was discovered that DCMTK incorrectly handled memory when processing an invalid incoming DIMSE message. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-34508, CVE-2024-34509) Update Instructions: Run `sudo pro fix USN-7010-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dcmtk - 3.6.7-9.1ubuntu0.1~esm1 dcmtk-doc - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk-dev - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk17t64 - 3.6.7-9.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-41687
CVE-2021-41688
CVE-2021-41689
CVE-2021-41690
CVE-2022-2121
CVE-2022-43272
CVE-2024-28130
CVE-2024-34508
CVE-2024-34509
USN-7011-1 -- ClamAV vulnerabilities
Ubuntu 24.04 LTS
It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20505) It was discovered that ClamAV incorrectly handled logfile privileges. A local attacker could use this issue to cause ClamAV to overwrite arbitrary files, possibly leading to privilege escalation. (CVE-2024-20506) Update Instructions: Run `sudo pro fix USN-7011-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.7+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.7+dfsg-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20505
CVE-2024-20506
USN-7012-1 -- curl vulnerability
Ubuntu 24.04 LTS
Hiroki Kurosawa discovered that curl incorrectly handled certain OCSP responses. This could result in bad certificates not being checked properly, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7012-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.4 libcurl3t64-gnutls - 8.5.0-2ubuntu10.4 libcurl4-doc - 8.5.0-2ubuntu10.4 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.4 libcurl4-openssl-dev - 8.5.0-2ubuntu10.4 libcurl4t64 - 8.5.0-2ubuntu10.4 No subscription required
Medium
CVE-2024-8096
USN-7014-1 -- nginx vulnerability
Ubuntu 24.04 LTS
It was discovered that the nginx ngx_http_mp4 module incorrectly handled certain malformed mp4 files. In environments where the mp4 directive is in use, a remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7014-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.1 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.1 libnginx-mod-http-perl - 1.24.0-2ubuntu7.1 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.1 libnginx-mod-mail - 1.24.0-2ubuntu7.1 libnginx-mod-stream - 1.24.0-2ubuntu7.1 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.1 nginx - 1.24.0-2ubuntu7.1 nginx-common - 1.24.0-2ubuntu7.1 nginx-core - 1.24.0-2ubuntu7.1 nginx-dev - 1.24.0-2ubuntu7.1 nginx-doc - 1.24.0-2ubuntu7.1 nginx-extras - 1.24.0-2ubuntu7.1 nginx-full - 1.24.0-2ubuntu7.1 nginx-light - 1.24.0-2ubuntu7.1 No subscription required
Medium
CVE-2024-7347
USN-7015-1 -- Python vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043) It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232) It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923) It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592) It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088) Update Instructions: Run `sudo pro fix USN-7015-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.2 libpython3.12-dev - 3.12.3-1ubuntu0.2 libpython3.12-minimal - 3.12.3-1ubuntu0.2 libpython3.12-stdlib - 3.12.3-1ubuntu0.2 libpython3.12-testsuite - 3.12.3-1ubuntu0.2 libpython3.12t64 - 3.12.3-1ubuntu0.2 python3.12 - 3.12.3-1ubuntu0.2 python3.12-dev - 3.12.3-1ubuntu0.2 python3.12-doc - 3.12.3-1ubuntu0.2 python3.12-examples - 3.12.3-1ubuntu0.2 python3.12-full - 3.12.3-1ubuntu0.2 python3.12-minimal - 3.12.3-1ubuntu0.2 python3.12-nopie - 3.12.3-1ubuntu0.2 python3.12-venv - 3.12.3-1ubuntu0.2 No subscription required
Medium
CVE-2023-27043
CVE-2024-6232
CVE-2024-6923
CVE-2024-7592
CVE-2024-8088
USN-7016-1 -- FRR vulnerability
Ubuntu 24.04 LTS
Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7016-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.2 frr-doc - 8.4.4-1.1ubuntu6.2 frr-pythontools - 8.4.4-1.1ubuntu6.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.2 frr-snmp - 8.4.4-1.1ubuntu6.2 No subscription required
Medium
CVE-2024-44070
USN-7020-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gke - 6.8.0-1011.14 linux-gke - 6.8.0-1011.14 linux-gke-headers-6.8.0-1011 - 6.8.0-1011.14 linux-gke-tools-6.8.0-1011 - 6.8.0-1011.14 linux-headers-6.8.0-1011-gke - 6.8.0-1011.14 linux-headers-gke - 6.8.0-1011.14 linux-image-6.8.0-1011-gke - 6.8.0-1011.14 linux-image-gke - 6.8.0-1011.14 linux-image-unsigned-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-extra-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-gke - 6.8.0-1011.14 linux-tools-6.8.0-1011-gke - 6.8.0-1011.14 linux-tools-gke - 6.8.0-1011.14 No subscription required linux-buildinfo-6.8.0-1013-ibm - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oem - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-6.8.0-1013-ibm - 6.8.0-1013.13 linux-headers-6.8.0-1013-oem - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-ibm - 6.8.0-1013.13 linux-headers-ibm-classic - 6.8.0-1013.13 linux-headers-ibm-lts-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04a - 6.8.0-1013.13 linux-headers-oracle - 6.8.0-1013.13 linux-headers-oracle-64k - 6.8.0-1013.13 linux-ibm - 6.8.0-1013.13 linux-ibm-classic - 6.8.0-1013.13 linux-ibm-cloud-tools-common - 6.8.0-1013.13 linux-ibm-headers-6.8.0-1013 - 6.8.0-1013.13 linux-ibm-lts-24.04 - 6.8.0-1013.13 linux-ibm-source-6.8.0 - 6.8.0-1013.13 linux-ibm-tools-6.8.0-1013 - 6.8.0-1013.13 linux-image-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-image-ibm - 6.8.0-1013.13 linux-image-ibm-classic - 6.8.0-1013.13 linux-image-ibm-lts-24.04 - 6.8.0-1013.13 linux-image-oem-24.04 - 6.8.0-1013.13 linux-image-oem-24.04a - 6.8.0-1013.13 linux-image-oracle - 6.8.0-1013.13 linux-image-oracle-64k - 6.8.0-1013.13 linux-image-uc-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-uc-oem-24.04 - 6.8.0-1013.13 linux-image-uc-oem-24.04a - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-ipu6-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04 - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04a - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-iwlwifi-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-classic - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1013.13 linux-modules-usbio-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-usbio-oem-24.04 - 6.8.0-1013.13 linux-modules-usbio-oem-24.04a - 6.8.0-1013.13 linux-oem-24.04 - 6.8.0-1013.13 linux-oem-24.04a - 6.8.0-1013.13 linux-oem-6.8-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oem-6.8-tools-6.8.0-1013 - 6.8.0-1013.13 linux-oracle - 6.8.0-1013.13 linux-oracle-64k - 6.8.0-1013.13 linux-oracle-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oracle-tools-6.8.0-1013 - 6.8.0-1013.13 linux-tools-6.8.0-1013-ibm - 6.8.0-1013.13 linux-tools-6.8.0-1013-oem - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-tools-ibm - 6.8.0-1013.13 linux-tools-ibm-classic - 6.8.0-1013.13 linux-tools-ibm-lts-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04a - 6.8.0-1013.13 linux-tools-oracle - 6.8.0-1013.13 linux-tools-oracle-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-cloud-tools-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-headers-nvidia - 6.8.0-1014.15 linux-headers-nvidia-64k - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-nvidia - 6.8.0-1014.15 linux-image-nvidia-64k - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1014.15 linux-nvidia - 6.8.0-1014.15 linux-nvidia-64k - 6.8.0-1014.15 linux-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-host - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-tools-nvidia - 6.8.0-1014.15 linux-tools-nvidia-64k - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-buildinfo-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-extra-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency - 6.8.0-1014.15.1 linux-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency-headers-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1014.15.1 No subscription required linux-buildinfo-6.8.0-1015-gcp - 6.8.0-1015.17 linux-gcp - 6.8.0-1015.17 linux-gcp-headers-6.8.0-1015 - 6.8.0-1015.17 linux-gcp-tools-6.8.0-1015 - 6.8.0-1015.17 linux-headers-6.8.0-1015-gcp - 6.8.0-1015.17 linux-headers-gcp - 6.8.0-1015.17 linux-image-6.8.0-1015-gcp - 6.8.0-1015.17 linux-image-gcp - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-gcp - 6.8.0-1015.17 linux-tools-6.8.0-1015-gcp - 6.8.0-1015.17 linux-tools-gcp - 6.8.0-1015.17 No subscription required linux-aws - 6.8.0-1016.17 linux-aws-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-aws-headers-6.8.0-1016 - 6.8.0-1016.17 linux-aws-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-aws - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-aws - 6.8.0-1016.17 linux-image-6.8.0-1016-aws - 6.8.0-1016.17 linux-image-aws - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-aws - 6.8.0-1016.17 linux-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-tools-aws - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-45-generic - 6.8.0-45.45 linux-buildinfo-6.8.0-45-generic-64k - 6.8.0-45.45 linux-cloud-tools-6.8.0-45 - 6.8.0-45.45 linux-cloud-tools-6.8.0-45-generic - 6.8.0-45.45 linux-cloud-tools-common - 6.8.0-45.45 linux-cloud-tools-generic - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-cloud-tools-virtual - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-crashdump - 6.8.0-45.45 linux-doc - 6.8.0-45.45 linux-generic - 6.8.0-45.45 linux-generic-64k - 6.8.0-45.45 linux-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-generic-hwe-24.04 - 6.8.0-45.45 linux-generic-hwe-24.04-edge - 6.8.0-45.45 linux-generic-lpae - 6.8.0-45.45 linux-headers-6.8.0-45 - 6.8.0-45.45 linux-headers-6.8.0-45-generic - 6.8.0-45.45 linux-headers-6.8.0-45-generic-64k - 6.8.0-45.45 linux-headers-generic - 6.8.0-45.45 linux-headers-generic-64k - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-lpae - 6.8.0-45.45 linux-headers-kvm - 6.8.0-45.45 linux-headers-laptop-23.10 - 6.8.0-45.45 linux-headers-oem-20.04 - 6.8.0-45.45 linux-headers-oem-20.04b - 6.8.0-45.45 linux-headers-oem-20.04c - 6.8.0-45.45 linux-headers-oem-20.04d - 6.8.0-45.45 linux-headers-oem-22.04 - 6.8.0-45.45 linux-headers-virtual - 6.8.0-45.45 linux-headers-virtual-hwe-24.04 - 6.8.0-45.45 linux-headers-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-6.8.0-45-generic - 6.8.0-45.45 linux-image-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-extra-virtual - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic - 6.8.0-45.45 linux-image-generic-64k - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-hwe-24.04 - 6.8.0-45.45 linux-image-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-lpae - 6.8.0-45.45 linux-image-kvm - 6.8.0-45.45 linux-image-laptop-23.10 - 6.8.0-45.45 linux-image-oem-20.04 - 6.8.0-45.45 linux-image-oem-20.04b - 6.8.0-45.45 linux-image-oem-20.04c - 6.8.0-45.45 linux-image-oem-20.04d - 6.8.0-45.45 linux-image-oem-22.04 - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-uc-generic - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04 - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-virtual - 6.8.0-45.45 linux-image-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-kvm - 6.8.0-45.45 linux-laptop-23.10 - 6.8.0-45.45 linux-lib-rust-6.8.0-45-generic - 6.8.0-45.45 linux-libc-dev - 6.8.0-45.45 linux-modules-6.8.0-45-generic - 6.8.0-45.45 linux-modules-6.8.0-45-generic-64k - 6.8.0-45.45 linux-modules-extra-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-generic - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-6.8.0-45-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04 - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04d - 6.8.0-45.45 linux-modules-iwlwifi-oem-22.04 - 6.8.0-45.45 linux-modules-usbio-6.8.0-45-generic - 6.8.0-45.45 linux-modules-usbio-generic - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-45.45 linux-oem-20.04 - 6.8.0-45.45 linux-oem-20.04b - 6.8.0-45.45 linux-oem-20.04c - 6.8.0-45.45 linux-oem-20.04d - 6.8.0-45.45 linux-oem-22.04 - 6.8.0-45.45 linux-source - 6.8.0-45.45 linux-source-6.8.0 - 6.8.0-45.45 linux-tools-6.8.0-45 - 6.8.0-45.45 linux-tools-6.8.0-45-generic - 6.8.0-45.45 linux-tools-6.8.0-45-generic-64k - 6.8.0-45.45 linux-tools-common - 6.8.0-45.45 linux-tools-generic - 6.8.0-45.45 linux-tools-generic-64k - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-lpae - 6.8.0-45.45 linux-tools-host - 6.8.0-45.45 linux-tools-kvm - 6.8.0-45.45 linux-tools-laptop-23.10 - 6.8.0-45.45 linux-tools-oem-20.04 - 6.8.0-45.45 linux-tools-oem-20.04b - 6.8.0-45.45 linux-tools-oem-20.04c - 6.8.0-45.45 linux-tools-oem-20.04d - 6.8.0-45.45 linux-tools-oem-22.04 - 6.8.0-45.45 linux-tools-virtual - 6.8.0-45.45 linux-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-virtual - 6.8.0-45.45 linux-virtual-hwe-24.04 - 6.8.0-45.45 linux-virtual-hwe-24.04-edge - 6.8.0-45.45 No subscription required linux-buildinfo-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-buildinfo-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-cloud-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency - 6.8.0-45.45.1 linux-headers-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency - 6.8.0-45.45.1 linux-image-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency - 6.8.0-45.45.1 linux-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-common - 6.8.0-45.45.1 linux-lowlatency-headers-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-lib-rust-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-lowlatency-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-tools-common - 6.8.0-45.45.1 linux-lowlatency-tools-host - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-modules-iwlwifi-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency - 6.8.0-45.45.1 linux-tools-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7020-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1015.17 linux-azure-cloud-tools-6.8.0-1015 - 6.8.0-1015.17 linux-azure-fde - 6.8.0-1015.17 linux-azure-headers-6.8.0-1015 - 6.8.0-1015.17 linux-azure-tools-6.8.0-1015 - 6.8.0-1015.17 linux-buildinfo-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-azure - 6.8.0-1015.17 linux-headers-6.8.0-1015-azure - 6.8.0-1015.17 linux-headers-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure-fde - 6.8.0-1015.17 linux-image-azure - 6.8.0-1015.17 linux-image-azure-fde - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-azure - 6.8.0-1015.17 linux-modules-involflt-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-involflt-azure - 6.8.0-1015.17 linux-modules-iwlwifi-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-iwlwifi-azure - 6.8.0-1015.17 linux-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-tools-azure - 6.8.0-1015.17 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7020-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009, CVE-2024-42154, CVE-2024-42228) Update Instructions: Run `sudo pro fix USN-7020-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-raspi - 6.8.0-1012.13 linux-image-6.8.0-1012-raspi - 6.8.0-1012.13 linux-image-raspi - 6.8.0-1012.13 linux-modules-6.8.0-1012-raspi - 6.8.0-1012.13 linux-raspi - 6.8.0-1012.13 linux-raspi-headers-6.8.0-1012 - 6.8.0-1012.13 linux-raspi-tools-6.8.0-1012 - 6.8.0-1012.13 linux-tools-6.8.0-1012-raspi - 6.8.0-1012.13 linux-tools-raspi - 6.8.0-1012.13 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7027-1 -- Emacs vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-45939) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48337) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48338) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48339) It was discovered that Emacs incorrectly handled filename sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-30203, CVE-2024-30204, CVE-2024-30205) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7027-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: emacs - 1:29.3+1-1ubuntu2+esm1 emacs-bin-common - 1:29.3+1-1ubuntu2+esm1 emacs-common - 1:29.3+1-1ubuntu2+esm1 emacs-el - 1:29.3+1-1ubuntu2+esm1 emacs-gtk - 1:29.3+1-1ubuntu2+esm1 emacs-lucid - 1:29.3+1-1ubuntu2+esm1 emacs-nox - 1:29.3+1-1ubuntu2+esm1 emacs-pgtk - 1:29.3+1-1ubuntu2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-45939
CVE-2022-48337
CVE-2022-48338
CVE-2022-48339
CVE-2023-28617
CVE-2024-30203
CVE-2024-30204
CVE-2024-30205
CVE-2024-39331
https://launchpad.net/bugs/2070418
USN-7031-1 -- Puma vulnerability
Ubuntu 24.04 LTS
It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to overwrite header values set by intermediate proxies by providing duplicate headers containing underscore characters. Update Instructions: Run `sudo pro fix USN-7031-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 6.4.2-4ubuntu4.3 No subscription required
Medium
CVE-2024-45614
USN-7032-1 -- Tomcat vulnerability
Ubuntu 24.04 LTS
It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. Update Instructions: Run `sudo pro fix USN-7032-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1 No subscription required
Medium
CVE-2023-46589
USN-7033-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7033-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240910.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-23984
CVE-2024-24968
USN-7037-1 -- OpenJPEG vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenJPEG could enter a large loop and continuously print warning messages when given specially crafted input. An attacker could potentially use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7037-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.1 libopenjp2-7-dev - 2.5.0-2ubuntu0.1 libopenjp2-tools - 2.5.0-2ubuntu0.1 libopenjpip-dec-server - 2.5.0-2ubuntu0.1 libopenjpip-server - 2.5.0-2ubuntu0.1 libopenjpip-viewer - 2.5.0-2ubuntu0.1 libopenjpip7 - 2.5.0-2ubuntu0.1 openjpeg-doc - 2.5.0-2ubuntu0.1 No subscription required
Medium
CVE-2023-39327
USN-7038-1 -- APR vulnerability
Ubuntu 24.04 LTS
Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data. Update Instructions: Run `sudo pro fix USN-7038-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapr1-dev - 1.7.2-3.1ubuntu0.1 libapr1t64 - 1.7.2-3.1ubuntu0.1 No subscription required
Medium
CVE-2023-49582
USN-7041-1 -- CUPS vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that CUPS incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7041-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups - 2.4.7-1.2ubuntu7.3 cups-bsd - 2.4.7-1.2ubuntu7.3 cups-client - 2.4.7-1.2ubuntu7.3 cups-common - 2.4.7-1.2ubuntu7.3 cups-core-drivers - 2.4.7-1.2ubuntu7.3 cups-daemon - 2.4.7-1.2ubuntu7.3 cups-ipp-utils - 2.4.7-1.2ubuntu7.3 cups-ppdc - 2.4.7-1.2ubuntu7.3 cups-server-common - 2.4.7-1.2ubuntu7.3 libcups2-dev - 2.4.7-1.2ubuntu7.3 libcups2t64 - 2.4.7-1.2ubuntu7.3 libcupsimage2-dev - 2.4.7-1.2ubuntu7.3 libcupsimage2t64 - 2.4.7-1.2ubuntu7.3 No subscription required
Medium
CVE-2024-47175
USN-7042-1 -- cups-browsed vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.1 cups-browsed-tests - 2.0.0-0ubuntu10.1 No subscription required
Medium
CVE-2024-47176
USN-7042-2 -- cups-browsed vulnerability
Ubuntu 24.04 LTS
USN-7042-1 fixed a vulnerability in cups-browsed. This update improves the fix by removing support for the legacy CUPS printer discovery protocol entirely. Original advisory details: Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.2 cups-browsed-tests - 2.0.0-0ubuntu10.2 No subscription required
Medium
CVE-2024-47176
USN-7044-1 -- libcupsfilters vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that libcupsfilters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7044-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcupsfilters-dev - 2.0.0-0ubuntu7.1 libcupsfilters-tests - 2.0.0-0ubuntu7.1 libcupsfilters2-common - 2.0.0-0ubuntu7.1 libcupsfilters2t64 - 2.0.0-0ubuntu7.1 No subscription required
Medium
CVE-2024-47076
USN-7045-1 -- libppd vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that libppd incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7045-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libppd-dev - 2:2.0.0-0ubuntu4.1 libppd-tests - 2:2.0.0-0ubuntu4.1 libppd-utils - 2:2.0.0-0ubuntu4.1 libppd2 - 2:2.0.0-0ubuntu4.1 libppd2-common - 2:2.0.0-0ubuntu4.1 ppdc - 2:2.0.0-0ubuntu4.1 No subscription required
Medium
CVE-2024-47175
USN-7046-1 -- Flatpak and Bubblewrap vulnerability
Ubuntu 24.04 LTS
It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it would not normally have access to. A patch was also needed to Bubblewrap in order to avoid race conditions caused by this fix. Update Instructions: Run `sudo pro fix USN-7046-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bubblewrap - 0.9.0-1ubuntu0.1 No subscription required flatpak - 1.14.6-1ubuntu0.1 flatpak-tests - 1.14.6-1ubuntu0.1 gir1.2-flatpak-1.0 - 1.14.6-1ubuntu0.1 libflatpak-dev - 1.14.6-1ubuntu0.1 libflatpak-doc - 1.14.6-1ubuntu0.1 libflatpak0 - 1.14.6-1ubuntu0.1 No subscription required
Medium
CVE-2024-42472
https://launchpad.net/bugs/2077087
USN-7048-1 -- Vim vulnerability
Ubuntu 24.04 LTS
Suyue Guo discovered that Vim incorrectly handled memory when flushing the typeahead buffer, leading to heap-buffer-overflow. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7048-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.3 vim-athena - 2:9.1.0016-1ubuntu7.3 vim-common - 2:9.1.0016-1ubuntu7.3 vim-doc - 2:9.1.0016-1ubuntu7.3 vim-gtk3 - 2:9.1.0016-1ubuntu7.3 vim-gui-common - 2:9.1.0016-1ubuntu7.3 vim-motif - 2:9.1.0016-1ubuntu7.3 vim-nox - 2:9.1.0016-1ubuntu7.3 vim-runtime - 2:9.1.0016-1ubuntu7.3 vim-tiny - 2:9.1.0016-1ubuntu7.3 xxd - 2:9.1.0016-1ubuntu7.3 No subscription required
Medium
CVE-2024-43802
USN-7049-1 -- PHP vulnerabilities
Ubuntu 24.04 LTS
It was discovered that PHP incorrectly handled parsing multipart form data. A remote attacker could possibly use this issue to inject payloads and cause PHP to ignore legitimate data. (CVE-2024-8925) It was discovered that PHP incorrectly handled the cgi.force_redirect configuration option due to environment variable collisions. In certain configurations, an attacker could possibly use this issue bypass force_redirect restrictions. (CVE-2024-8927) It was discovered that PHP-FPM incorrectly handled logging. A remote attacker could possibly use this issue to alter and inject arbitrary contents into log files. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-9026) Update Instructions: Run `sudo pro fix USN-7049-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.2 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.2 php8.3 - 8.3.6-0ubuntu0.24.04.2 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.2 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.2 php8.3-cgi - 8.3.6-0ubuntu0.24.04.2 php8.3-cli - 8.3.6-0ubuntu0.24.04.2 php8.3-common - 8.3.6-0ubuntu0.24.04.2 php8.3-curl - 8.3.6-0ubuntu0.24.04.2 php8.3-dba - 8.3.6-0ubuntu0.24.04.2 php8.3-dev - 8.3.6-0ubuntu0.24.04.2 php8.3-enchant - 8.3.6-0ubuntu0.24.04.2 php8.3-fpm - 8.3.6-0ubuntu0.24.04.2 php8.3-gd - 8.3.6-0ubuntu0.24.04.2 php8.3-gmp - 8.3.6-0ubuntu0.24.04.2 php8.3-imap - 8.3.6-0ubuntu0.24.04.2 php8.3-interbase - 8.3.6-0ubuntu0.24.04.2 php8.3-intl - 8.3.6-0ubuntu0.24.04.2 php8.3-ldap - 8.3.6-0ubuntu0.24.04.2 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.2 php8.3-mysql - 8.3.6-0ubuntu0.24.04.2 php8.3-odbc - 8.3.6-0ubuntu0.24.04.2 php8.3-opcache - 8.3.6-0ubuntu0.24.04.2 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.2 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.2 php8.3-pspell - 8.3.6-0ubuntu0.24.04.2 php8.3-readline - 8.3.6-0ubuntu0.24.04.2 php8.3-snmp - 8.3.6-0ubuntu0.24.04.2 php8.3-soap - 8.3.6-0ubuntu0.24.04.2 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.2 php8.3-sybase - 8.3.6-0ubuntu0.24.04.2 php8.3-tidy - 8.3.6-0ubuntu0.24.04.2 php8.3-xml - 8.3.6-0ubuntu0.24.04.2 php8.3-xsl - 8.3.6-0ubuntu0.24.04.2 php8.3-zip - 8.3.6-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-8925
CVE-2024-8927
CVE-2024-9026
USN-7051-1 -- AsyncSSH vulnerability
Ubuntu 24.04 LTS
Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. Update Instructions: Run `sudo pro fix USN-7051-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-asyncssh-doc - 2.10.1-2ubuntu0.1 python3-asyncssh - 2.10.1-2ubuntu0.1 No subscription required
Medium
CVE-2023-48795
USN-7054-1 -- unzip vulnerability
Ubuntu 24.04 LTS
It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into opening a specially crafted zip file, an attacker could possibly use this issue to cause unzip to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7054-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unzip - 6.0-28ubuntu4.1 No subscription required
Low
CVE-2021-4217
USN-7055-1 -- FreeRADIUS vulnerability
Ubuntu 24.04 LTS
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that FreeRADIUS incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces new configuration options called "limit_proxy_state" and "require_message_authenticator" that default to "auto" but should be set to "yes" once all RADIUS devices have been upgraded on a network. Update Instructions: Run `sudo pro fix USN-7055-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freeradius - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-common - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-config - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-dhcp - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-iodbc - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-krb5 - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-ldap - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-memcached - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-mysql - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-postgresql - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-python3 - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-redis - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-rest - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-utils - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-yubikey - 3.2.5+dfsg-3~ubuntu24.04.1 libfreeradius-dev - 3.2.5+dfsg-3~ubuntu24.04.1 libfreeradius3 - 3.2.5+dfsg-3~ubuntu24.04.1 No subscription required
Medium
CVE-2024-3596
USN-7057-1 -- WEBrick vulnerability
Ubuntu 24.04 LTS
It was discovered that WEBrick incorrectly handled having both a Content- Length header and a Transfer-Encoding header. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. Update Instructions: Run `sudo pro fix USN-7057-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-webrick - 1.8.1-1ubuntu0.1 No subscription required
Medium
CVE-2024-47220
USN-7058-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
Brennan Conroy discovered that the .NET Kestrel web server did not properly handle closing HTTP/3 streams under certain circumstances. An attacker could possibly use this issue to achieve remote code execution. This vulnerability only impacted .NET8. (CVE-2024-38229) It was discovered that .NET components designed to process malicious input were susceptible to hash flooding attacks. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43483) It was discovered that the .NET System.IO.Packaging namespace did not properly process SortedList data structures. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43484) It was discovered that .NET did not properly handle the deserialization of of certain JSON properties. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43485) Update Instructions: Run `sudo pro fix USN-7058-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-8.0 - 8.0.10-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.10-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 No subscription required dotnet-sdk-8.0 - 8.0.110-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.110-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.110-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.110-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.110-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.110-8.0.10-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-38229
CVE-2024-43483
CVE-2024-43484
CVE-2024-43485
USN-7059-1 -- OATH Toolkit vulnerability
Ubuntu 24.04 LTS
Fabian Vogt discovered that OATH Toolkit incorrectly handled file permissions. A remote attacker could possibly use this issue to overwrite root owned files, leading to a privilege escalation attack. (CVE-2024-47191) Update Instructions: Run `sudo pro fix USN-7059-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liboath-dev - 2.6.11-2.1ubuntu0.1 liboath0t64 - 2.6.11-2.1ubuntu0.1 libpam-oath - 2.6.11-2.1ubuntu0.1 libpskc-dev - 2.6.11-2.1ubuntu0.1 libpskc0t64 - 2.6.11-2.1ubuntu0.1 oathtool - 2.6.11-2.1ubuntu0.1 pskctool - 2.6.11-2.1ubuntu0.1 No subscription required
Medium
CVE-2024-47191
USN-7062-1 -- libgsf vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libgsf incorrectly handled certain Compound Document Binary files. If a user or automated system were tricked into opening a specially crafted file, a remote attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7062-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gsf-1 - 1.14.51-2ubuntu0.1 libgsf-1-114 - 1.14.51-2ubuntu0.1 libgsf-1-common - 1.14.51-2ubuntu0.1 libgsf-1-dev - 1.14.51-2ubuntu0.1 libgsf-bin - 1.14.51-2ubuntu0.1 No subscription required
Medium
CVE-2024-36474
CVE-2024-42415
USN-7063-1 -- Ubuntu Advantage Desktop Daemon vulnerability
Ubuntu 24.04 LTS
Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon leaked the Pro token to unprivileged users by passing the token as an argument in plaintext. An attacker could use this issue to gain unauthorized access to an Ubuntu Pro subscription. (CVE-2024-6388) Update Instructions: Run `sudo pro fix USN-7063-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ubuntu-advantage-desktop-daemon - 1.11ubuntu0.1 No subscription required
Medium
CVE-2024-6388
USN-7064-1 -- nano vulnerability
Ubuntu 24.04 LTS
It was discovered that nano allowed a possible privilege escalation through an insecure temporary file. If nano was killed while editing, the permissions granted to the emergency save file could be used by an attacker to escalate privileges using a malicious symlink. Update Instructions: Run `sudo pro fix USN-7064-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nano - 7.2-2ubuntu0.1 nano-tiny - 7.2-2ubuntu0.1 No subscription required
Low
CVE-2024-5742
USN-7070-1 -- libarchive vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libarchive mishandled certain memory checks, which could result in a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-36227) It was discovered that libarchive mishandled certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-48957, CVE-2024-48958) Update Instructions: Run `sudo pro fix USN-7070-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.2 libarchive-tools - 3.7.2-2ubuntu0.2 libarchive13t64 - 3.7.2-2ubuntu0.2 No subscription required
Medium
CVE-2022-36227
CVE-2024-48957
CVE-2024-48958
USN-7071-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; (CVE-2024-45016) Update Instructions: Run `sudo pro fix USN-7071-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-raspi - 6.8.0-1013.14 linux-headers-6.8.0-1013-raspi - 6.8.0-1013.14 linux-headers-raspi - 6.8.0-1013.14 linux-image-6.8.0-1013-raspi - 6.8.0-1013.14 linux-image-raspi - 6.8.0-1013.14 linux-modules-6.8.0-1013-raspi - 6.8.0-1013.14 linux-raspi - 6.8.0-1013.14 linux-raspi-headers-6.8.0-1013 - 6.8.0-1013.14 linux-raspi-tools-6.8.0-1013 - 6.8.0-1013.14 linux-tools-6.8.0-1013-raspi - 6.8.0-1013.14 linux-tools-raspi - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1014-ibm - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oem - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oracle - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-headers-6.8.0-1014-ibm - 6.8.0-1014.14 linux-headers-6.8.0-1014-oem - 6.8.0-1014.14 linux-headers-6.8.0-1014-oracle - 6.8.0-1014.14 linux-headers-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-headers-ibm - 6.8.0-1014.14 linux-headers-ibm-classic - 6.8.0-1014.14 linux-headers-ibm-lts-24.04 - 6.8.0-1014.14 linux-headers-oem-24.04 - 6.8.0-1014.14 linux-headers-oem-24.04a - 6.8.0-1014.14 linux-headers-oracle - 6.8.0-1014.14 linux-headers-oracle-64k - 6.8.0-1014.14 linux-ibm - 6.8.0-1014.14 linux-ibm-classic - 6.8.0-1014.14 linux-ibm-cloud-tools-common - 6.8.0-1014.14 linux-ibm-headers-6.8.0-1014 - 6.8.0-1014.14 linux-ibm-lts-24.04 - 6.8.0-1014.14 linux-ibm-source-6.8.0 - 6.8.0-1014.14 linux-ibm-tools-6.8.0-1014 - 6.8.0-1014.14 linux-image-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-6.8.0-1014-oracle - 6.8.0-1014.14 linux-image-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-image-ibm - 6.8.0-1014.14 linux-image-ibm-classic - 6.8.0-1014.14 linux-image-ibm-lts-24.04 - 6.8.0-1014.14 linux-image-oem-24.04 - 6.8.0-1014.14 linux-image-oem-24.04a - 6.8.0-1014.14 linux-image-oracle - 6.8.0-1014.14 linux-image-oracle-64k - 6.8.0-1014.14 linux-image-uc-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-uc-oem-24.04 - 6.8.0-1014.14 linux-image-uc-oem-24.04a - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oracle - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-6.8.0-1014-oracle - 6.8.0-1014.14 linux-modules-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-oracle - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-ipu6-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-ipu6-oem-24.04 - 6.8.0-1014.14 linux-modules-ipu6-oem-24.04a - 6.8.0-1014.14 linux-modules-iwlwifi-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-iwlwifi-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-classic - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1014.14 linux-modules-usbio-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-usbio-oem-24.04 - 6.8.0-1014.14 linux-modules-usbio-oem-24.04a - 6.8.0-1014.14 linux-oem-24.04 - 6.8.0-1014.14 linux-oem-24.04a - 6.8.0-1014.14 linux-oem-6.8-headers-6.8.0-1014 - 6.8.0-1014.14 linux-oem-6.8-tools-6.8.0-1014 - 6.8.0-1014.14 linux-oracle - 6.8.0-1014.14 linux-oracle-64k - 6.8.0-1014.14 linux-oracle-headers-6.8.0-1014 - 6.8.0-1014.14 linux-oracle-tools-6.8.0-1014 - 6.8.0-1014.14 linux-tools-6.8.0-1014-ibm - 6.8.0-1014.14 linux-tools-6.8.0-1014-oem - 6.8.0-1014.14 linux-tools-6.8.0-1014-oracle - 6.8.0-1014.14 linux-tools-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-tools-ibm - 6.8.0-1014.14 linux-tools-ibm-classic - 6.8.0-1014.14 linux-tools-ibm-lts-24.04 - 6.8.0-1014.14 linux-tools-oem-24.04 - 6.8.0-1014.14 linux-tools-oem-24.04a - 6.8.0-1014.14 linux-tools-oracle - 6.8.0-1014.14 linux-tools-oracle-64k - 6.8.0-1014.14 No subscription required linux-buildinfo-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-cloud-tools-nvidia - 6.8.0-1015.16 linux-headers-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-headers-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-headers-nvidia - 6.8.0-1015.16 linux-headers-nvidia-64k - 6.8.0-1015.16 linux-image-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-image-nvidia - 6.8.0-1015.16 linux-image-nvidia-64k - 6.8.0-1015.16 linux-image-uc-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-uc-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-nvidia-fs-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1015.16 linux-nvidia - 6.8.0-1015.16 linux-nvidia-64k - 6.8.0-1015.16 linux-nvidia-headers-6.8.0-1015 - 6.8.0-1015.16 linux-nvidia-tools-6.8.0-1015 - 6.8.0-1015.16 linux-nvidia-tools-host - 6.8.0-1015.16 linux-tools-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-tools-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-tools-nvidia - 6.8.0-1015.16 linux-tools-nvidia-64k - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-buildinfo-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-headers-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-uc-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-uc-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-unsigned-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-unsigned-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-extra-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-nvidia-lowlatency - 6.8.0-1015.16.1 linux-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-nvidia-lowlatency-headers-6.8.0-1015 - 6.8.0-1015.16.1 linux-nvidia-lowlatency-tools-6.8.0-1015 - 6.8.0-1015.16.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1015.16.1 linux-tools-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-tools-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-tools-nvidia-lowlatency - 6.8.0-1015.16.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1015.16.1 No subscription required linux-buildinfo-6.8.0-1016-gcp - 6.8.0-1016.18 linux-gcp - 6.8.0-1016.18 linux-gcp-headers-6.8.0-1016 - 6.8.0-1016.18 linux-gcp-tools-6.8.0-1016 - 6.8.0-1016.18 linux-headers-6.8.0-1016-gcp - 6.8.0-1016.18 linux-headers-gcp - 6.8.0-1016.18 linux-image-6.8.0-1016-gcp - 6.8.0-1016.18 linux-image-gcp - 6.8.0-1016.18 linux-image-unsigned-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-extra-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-extra-gcp - 6.8.0-1016.18 linux-tools-6.8.0-1016-gcp - 6.8.0-1016.18 linux-tools-gcp - 6.8.0-1016.18 No subscription required linux-aws - 6.8.0-1017.18 linux-aws-cloud-tools-6.8.0-1017 - 6.8.0-1017.18 linux-aws-headers-6.8.0-1017 - 6.8.0-1017.18 linux-aws-tools-6.8.0-1017 - 6.8.0-1017.18 linux-buildinfo-6.8.0-1017-aws - 6.8.0-1017.18 linux-cloud-tools-6.8.0-1017-aws - 6.8.0-1017.18 linux-headers-6.8.0-1017-aws - 6.8.0-1017.18 linux-headers-aws - 6.8.0-1017.18 linux-image-6.8.0-1017-aws - 6.8.0-1017.18 linux-image-aws - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-extra-aws - 6.8.0-1017.18 linux-tools-6.8.0-1017-aws - 6.8.0-1017.18 linux-tools-aws - 6.8.0-1017.18 No subscription required linux-buildinfo-6.8.0-47-generic - 6.8.0-47.47 linux-buildinfo-6.8.0-47-generic-64k - 6.8.0-47.47 linux-cloud-tools-6.8.0-47 - 6.8.0-47.47 linux-cloud-tools-6.8.0-47-generic - 6.8.0-47.47 linux-cloud-tools-common - 6.8.0-47.47 linux-cloud-tools-generic - 6.8.0-47.47 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-47.47 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-47.47 linux-cloud-tools-virtual - 6.8.0-47.47 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-47.47 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-crashdump - 6.8.0-47.47 linux-doc - 6.8.0-47.47 linux-generic - 6.8.0-47.47 linux-generic-64k - 6.8.0-47.47 linux-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-generic-hwe-24.04 - 6.8.0-47.47 linux-generic-hwe-24.04-edge - 6.8.0-47.47 linux-generic-lpae - 6.8.0-47.47 linux-headers-6.8.0-47 - 6.8.0-47.47 linux-headers-6.8.0-47-generic - 6.8.0-47.47 linux-headers-6.8.0-47-generic-64k - 6.8.0-47.47 linux-headers-generic - 6.8.0-47.47 linux-headers-generic-64k - 6.8.0-47.47 linux-headers-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-headers-generic-hwe-24.04 - 6.8.0-47.47 linux-headers-generic-hwe-24.04-edge - 6.8.0-47.47 linux-headers-generic-lpae - 6.8.0-47.47 linux-headers-kvm - 6.8.0-47.47 linux-headers-laptop-23.10 - 6.8.0-47.47 linux-headers-oem-20.04 - 6.8.0-47.47 linux-headers-oem-20.04b - 6.8.0-47.47 linux-headers-oem-20.04c - 6.8.0-47.47 linux-headers-oem-20.04d - 6.8.0-47.47 linux-headers-oem-22.04 - 6.8.0-47.47 linux-headers-virtual - 6.8.0-47.47 linux-headers-virtual-hwe-24.04 - 6.8.0-47.47 linux-headers-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-image-6.8.0-47-generic - 6.8.0-47.47 linux-image-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-extra-virtual - 6.8.0-47.47 linux-image-extra-virtual-hwe-24.04 - 6.8.0-47.47 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic - 6.8.0-47.47 linux-image-generic-64k - 6.8.0-47.47 linux-image-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic-hwe-24.04 - 6.8.0-47.47 linux-image-generic-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic-lpae - 6.8.0-47.47 linux-image-kvm - 6.8.0-47.47 linux-image-laptop-23.10 - 6.8.0-47.47 linux-image-oem-20.04 - 6.8.0-47.47 linux-image-oem-20.04b - 6.8.0-47.47 linux-image-oem-20.04c - 6.8.0-47.47 linux-image-oem-20.04d - 6.8.0-47.47 linux-image-oem-22.04 - 6.8.0-47.47 linux-image-uc-6.8.0-47-generic - 6.8.0-47.47 linux-image-uc-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-uc-generic - 6.8.0-47.47 linux-image-uc-generic-hwe-24.04 - 6.8.0-47.47 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-47.47 linux-image-unsigned-6.8.0-47-generic - 6.8.0-47.47 linux-image-unsigned-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-virtual - 6.8.0-47.47 linux-image-virtual-hwe-24.04 - 6.8.0-47.47 linux-image-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-kvm - 6.8.0-47.47 linux-laptop-23.10 - 6.8.0-47.47 linux-lib-rust-6.8.0-47-generic - 6.8.0-47.47 linux-libc-dev - 6.8.0-47.47 linux-modules-6.8.0-47-generic - 6.8.0-47.47 linux-modules-6.8.0-47-generic-64k - 6.8.0-47.47 linux-modules-extra-6.8.0-47-generic - 6.8.0-47.47 linux-modules-ipu6-6.8.0-47-generic - 6.8.0-47.47 linux-modules-ipu6-generic - 6.8.0-47.47 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-47.47 linux-modules-iwlwifi-6.8.0-47-generic - 6.8.0-47.47 linux-modules-iwlwifi-generic - 6.8.0-47.47 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-47.47 linux-modules-iwlwifi-oem-20.04 - 6.8.0-47.47 linux-modules-iwlwifi-oem-20.04d - 6.8.0-47.47 linux-modules-iwlwifi-oem-22.04 - 6.8.0-47.47 linux-modules-usbio-6.8.0-47-generic - 6.8.0-47.47 linux-modules-usbio-generic - 6.8.0-47.47 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-47.47 linux-oem-20.04 - 6.8.0-47.47 linux-oem-20.04b - 6.8.0-47.47 linux-oem-20.04c - 6.8.0-47.47 linux-oem-20.04d - 6.8.0-47.47 linux-oem-22.04 - 6.8.0-47.47 linux-source - 6.8.0-47.47 linux-source-6.8.0 - 6.8.0-47.47 linux-tools-6.8.0-47 - 6.8.0-47.47 linux-tools-6.8.0-47-generic - 6.8.0-47.47 linux-tools-6.8.0-47-generic-64k - 6.8.0-47.47 linux-tools-common - 6.8.0-47.47 linux-tools-generic - 6.8.0-47.47 linux-tools-generic-64k - 6.8.0-47.47 linux-tools-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-tools-generic-hwe-24.04 - 6.8.0-47.47 linux-tools-generic-hwe-24.04-edge - 6.8.0-47.47 linux-tools-generic-lpae - 6.8.0-47.47 linux-tools-host - 6.8.0-47.47 linux-tools-kvm - 6.8.0-47.47 linux-tools-laptop-23.10 - 6.8.0-47.47 linux-tools-oem-20.04 - 6.8.0-47.47 linux-tools-oem-20.04b - 6.8.0-47.47 linux-tools-oem-20.04c - 6.8.0-47.47 linux-tools-oem-20.04d - 6.8.0-47.47 linux-tools-oem-22.04 - 6.8.0-47.47 linux-tools-virtual - 6.8.0-47.47 linux-tools-virtual-hwe-24.04 - 6.8.0-47.47 linux-tools-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-virtual - 6.8.0-47.47 linux-virtual-hwe-24.04 - 6.8.0-47.47 linux-virtual-hwe-24.04-edge - 6.8.0-47.47 No subscription required linux-buildinfo-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-buildinfo-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-cloud-tools-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-cloud-tools-lowlatency - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-headers-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-headers-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-headers-lowlatency - 6.8.0-47.47.1 linux-headers-lowlatency-64k - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-image-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-image-lowlatency - 6.8.0-47.47.1 linux-image-lowlatency-64k - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-unsigned-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-image-unsigned-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-lowlatency - 6.8.0-47.47.1 linux-lowlatency-64k - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-lowlatency-cloud-tools-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-cloud-tools-common - 6.8.0-47.47.1 linux-lowlatency-headers-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-lowlatency-lib-rust-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-lowlatency-tools-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-tools-common - 6.8.0-47.47.1 linux-lowlatency-tools-host - 6.8.0-47.47.1 linux-modules-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-modules-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-modules-iwlwifi-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-tools-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-tools-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-tools-lowlatency - 6.8.0-47.47.1 linux-tools-lowlatency-64k - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 No subscription required
Medium
CVE-2024-45016
USN-7071-2 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; (CVE-2024-45016) Update Instructions: Run `sudo pro fix USN-7071-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-gke - 6.8.0-1012.15 linux-gke - 6.8.0-1012.15 linux-gke-headers-6.8.0-1012 - 6.8.0-1012.15 linux-gke-tools-6.8.0-1012 - 6.8.0-1012.15 linux-headers-6.8.0-1012-gke - 6.8.0-1012.15 linux-headers-gke - 6.8.0-1012.15 linux-image-6.8.0-1012-gke - 6.8.0-1012.15 linux-image-gke - 6.8.0-1012.15 linux-image-unsigned-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-extra-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-iwlwifi-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-iwlwifi-gke - 6.8.0-1012.15 linux-tools-6.8.0-1012-gke - 6.8.0-1012.15 linux-tools-gke - 6.8.0-1012.15 No subscription required
Medium
CVE-2024-45016
USN-7074-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Network traffic control; (CVE-2024-45016, CVE-2024-45001) Update Instructions: Run `sudo pro fix USN-7074-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1016.18 linux-azure-cloud-tools-6.8.0-1016 - 6.8.0-1016.18 linux-azure-fde - 6.8.0-1016.18 linux-azure-headers-6.8.0-1016 - 6.8.0-1016.18 linux-azure-tools-6.8.0-1016 - 6.8.0-1016.18 linux-buildinfo-6.8.0-1016-azure - 6.8.0-1016.18 linux-cloud-tools-6.8.0-1016-azure - 6.8.0-1016.18 linux-cloud-tools-azure - 6.8.0-1016.18 linux-headers-6.8.0-1016-azure - 6.8.0-1016.18 linux-headers-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure-fde - 6.8.0-1016.18 linux-image-azure - 6.8.0-1016.18 linux-image-azure-fde - 6.8.0-1016.18 linux-image-unsigned-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-extra-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-extra-azure - 6.8.0-1016.18 linux-modules-involflt-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-involflt-azure - 6.8.0-1016.18 linux-modules-iwlwifi-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-iwlwifi-azure - 6.8.0-1016.18 linux-tools-6.8.0-1016-azure - 6.8.0-1016.18 linux-tools-azure - 6.8.0-1016.18 No subscription required
Medium
CVE-2024-45001
CVE-2024-45016
USN-7077-1 -- AMD Microcode vulnerability
Ubuntu 24.04 LTS
Enrique Nissim and Krzysztof Okupski discovered that some AMD processors did not properly restrict access to the System Management Mode (SMM) configuration when the SMM Lock was enabled. A privileged local attacker could possibly use this issue to further escalate their privileges and execute arbitrary code within the processor's firmware layer. Update Instructions: Run `sudo pro fix USN-7077-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amd64-microcode - 3.20231019.1ubuntu2.1 No subscription required
Medium
CVE-2023-31315
USN-7079-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7079-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.1-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.1-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.1-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.1-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.1-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-40866
CVE-2024-44187
USN-7080-1 -- Unbound vulnerability
Ubuntu 24.04 LTS
Toshifumi Sakaguchi discovered that Unbound incorrectly handled name compression for large RRsets, which could lead to excessive CPU usage. An attacker could potentially use this issue to cause a denial of service by sending specially crafted DNS responses. Update Instructions: Run `sudo pro fix USN-7080-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.3 libunbound8 - 1.19.2-1ubuntu3.3 python3-unbound - 1.19.2-1ubuntu3.3 unbound - 1.19.2-1ubuntu3.3 unbound-anchor - 1.19.2-1ubuntu3.3 unbound-host - 1.19.2-1ubuntu3.3 No subscription required
Medium
CVE-2024-8508
USN-7081-1 -- Go vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Go net/http module did not properly handle responses to requests with an "Expect: 100-continue" header under certain circumstances. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-24791) It was discovered that the Go parser module did not properly handle deeply nested literal values. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34155) It was discovered that the Go encoding/gob module did not properly handle message decoding under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34156) It was discovered that the Go build module did not properly handle certain build tag lines with deeply nested expressions. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34158) Update Instructions: Run `sudo pro fix USN-7081-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.22 - 1.22.2-2ubuntu0.3 golang-1.22-doc - 1.22.2-2ubuntu0.3 golang-1.22-go - 1.22.2-2ubuntu0.3 golang-1.22-src - 1.22.2-2ubuntu0.3 No subscription required
Medium
CVE-2024-24791
CVE-2024-34155
CVE-2024-34156
CVE-2024-34158
USN-7082-1 -- libheif vulnerability
Ubuntu 24.04 LTS
Gerrard Tai discovered that libheif did not properly validate certain images, leading to out-of-bounds read and write vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7082-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: heif-gdk-pixbuf - 1.17.6-1ubuntu4.1 heif-thumbnailer - 1.17.6-1ubuntu4.1 libheif-dev - 1.17.6-1ubuntu4.1 libheif-examples - 1.17.6-1ubuntu4.1 libheif-plugin-aomdec - 1.17.6-1ubuntu4.1 libheif-plugin-aomenc - 1.17.6-1ubuntu4.1 libheif-plugin-dav1d - 1.17.6-1ubuntu4.1 libheif-plugin-ffmpegdec - 1.17.6-1ubuntu4.1 libheif-plugin-j2kdec - 1.17.6-1ubuntu4.1 libheif-plugin-j2kenc - 1.17.6-1ubuntu4.1 libheif-plugin-jpegdec - 1.17.6-1ubuntu4.1 libheif-plugin-jpegenc - 1.17.6-1ubuntu4.1 libheif-plugin-libde265 - 1.17.6-1ubuntu4.1 libheif-plugin-rav1e - 1.17.6-1ubuntu4.1 libheif-plugin-svtenc - 1.17.6-1ubuntu4.1 libheif-plugin-x265 - 1.17.6-1ubuntu4.1 libheif1 - 1.17.6-1ubuntu4.1 No subscription required
Medium
CVE-2024-41311
USN-7083-1 -- OpenJPEG vulnerabilities
Ubuntu 24.04 LTS
It was discovered that OpenJPEG incorrectly handled certain memory operations when using the command line "-ImgDir" in a directory with a large number of files, leading to an integer overflow vulnerability. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-29338) It was discovered that OpenJPEG incorrectly handled decompressing certain .j2k files in sycc420_to_rgb, leading to a heap-based buffer overflow vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to execute arbitrary code. (CVE-2021-3575) It was discovered that OpenJPEG incorrectly handled certain memory operations in the opj2_decompress program. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-1122) Update Instructions: Run `sudo pro fix USN-7083-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.2 libopenjp2-7-dev - 2.5.0-2ubuntu0.2 libopenjp2-tools - 2.5.0-2ubuntu0.2 libopenjpip-dec-server - 2.5.0-2ubuntu0.2 libopenjpip-server - 2.5.0-2ubuntu0.2 libopenjpip-viewer - 2.5.0-2ubuntu0.2 libopenjpip7 - 2.5.0-2ubuntu0.2 openjpeg-doc - 2.5.0-2ubuntu0.2 No subscription required
Low
CVE-2021-29338
CVE-2021-3575
CVE-2022-1122
USN-7084-1 -- urllib3 vulnerability
Ubuntu 24.04 LTS
It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7084-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-urllib3 - 2.0.7-1ubuntu0.1 No subscription required
Low
CVE-2024-37891
USN-7084-2 -- pip vulnerability
Ubuntu 24.04 LTS
USN-7084-1 fixed vulnerability in urllib3. This update provides the corresponding update for the urllib3 module bundled into pip. Original advisory details: It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7084-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pip - 24.0+dfsg-1ubuntu1.1 python3-pip-whl - 24.0+dfsg-1ubuntu1.1 No subscription required
Low
CVE-2024-37891
USN-7085-1 -- X.Org X Server vulnerability
Ubuntu 24.04 LTS
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain memory operations in the X Keyboard Extension. An attacker could use this issue to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7085-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.12-1ubuntu1.1 xorg-server-source - 2:21.1.12-1ubuntu1.1 xserver-common - 2:21.1.12-1ubuntu1.1 xserver-xephyr - 2:21.1.12-1ubuntu1.1 xserver-xorg-core - 2:21.1.12-1ubuntu1.1 xserver-xorg-dev - 2:21.1.12-1ubuntu1.1 xserver-xorg-legacy - 2:21.1.12-1ubuntu1.1 xvfb - 2:21.1.12-1ubuntu1.1 No subscription required xwayland - 2:23.2.6-1ubuntu0.1 No subscription required
Medium
CVE-2024-9632
USN-7087-1 -- libarchive vulnerability
Ubuntu 24.04 LTS
It was discovered that libarchive incorrectly handled certain RAR archive files. If a user or automated system were tricked into processing a specially crafted RAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7087-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.3 libarchive-tools - 3.7.2-2ubuntu0.3 libarchive13t64 - 3.7.2-2ubuntu0.3 No subscription required
Medium
CVE-2024-20696
USN-7089-1 -- Linux kernel kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42084, CVE-2024-42252, CVE-2024-41096, CVE-2024-42237, CVE-2024-42140, CVE-2024-42150, CVE-2024-41031, CVE-2024-41059, CVE-2024-41062, CVE-2024-41051, CVE-2024-41028, CVE-2024-41090, CVE-2024-41092, CVE-2024-43855, CVE-2024-41021, CVE-2024-42229, CVE-2024-41056, CVE-2024-41048, CVE-2024-41036, CVE-2024-42094, CVE-2024-41089, CVE-2024-41068, CVE-2024-41039, CVE-2024-41095, CVE-2024-41069, CVE-2024-42234, CVE-2024-42136, CVE-2024-41025, CVE-2024-42157, CVE-2024-42248, CVE-2024-42087, CVE-2024-41041, CVE-2024-42230, CVE-2024-42151, CVE-2024-42130, CVE-2024-42244, CVE-2024-41079, CVE-2024-42253, CVE-2024-42092, CVE-2024-41022, CVE-2024-42137, CVE-2024-42132, CVE-2024-42108, CVE-2024-42155, CVE-2024-42127, CVE-2024-41060, CVE-2024-42074, CVE-2024-41081, CVE-2024-42066, CVE-2024-42098, CVE-2024-42082, CVE-2024-42093, CVE-2024-42245, CVE-2024-41072, CVE-2024-41052, CVE-2024-42161, CVE-2024-42096, CVE-2024-42115, CVE-2024-41074, CVE-2024-42120, CVE-2024-41046, CVE-2024-42239, CVE-2024-41063, CVE-2024-42090, CVE-2024-41023, CVE-2024-42069, CVE-2024-41087, CVE-2024-42158, CVE-2024-41067, CVE-2024-41084, CVE-2024-41077, CVE-2024-42240, CVE-2024-42145, CVE-2024-42102, CVE-2024-41020, CVE-2024-42231, CVE-2024-41053, CVE-2024-42131, CVE-2024-42089, CVE-2024-41083, CVE-2024-42247, CVE-2024-42105, CVE-2024-41044, CVE-2024-42128, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-42106, CVE-2024-41076, CVE-2024-42088, CVE-2024-41057, CVE-2024-41091, CVE-2024-42152, CVE-2024-41070, CVE-2024-41035, CVE-2024-41050, CVE-2024-39487, CVE-2024-42113, CVE-2024-42250, CVE-2024-41047, CVE-2024-42149, CVE-2024-42079, CVE-2024-42091, CVE-2024-42227, CVE-2024-42095, CVE-2024-42109, CVE-2024-41033, CVE-2023-52888, CVE-2024-41061, CVE-2024-42223, CVE-2024-42235, CVE-2024-41086, CVE-2024-42133, CVE-2024-41082, CVE-2024-41071, CVE-2024-41007, CVE-2023-52887, CVE-2024-39486, CVE-2024-41075, CVE-2024-42101, CVE-2024-42077, CVE-2024-41042, CVE-2024-42225, CVE-2024-42126, CVE-2024-41094, CVE-2024-41085, CVE-2024-41019, CVE-2024-41058, CVE-2024-41066, CVE-2024-42156, CVE-2024-42119, CVE-2024-41032, CVE-2024-41088, CVE-2024-42100, CVE-2024-42142, CVE-2024-41054, CVE-2024-42103, CVE-2024-42124, CVE-2024-41034, CVE-2024-42251, CVE-2024-42153, CVE-2024-41045, CVE-2024-42086, CVE-2024-42243, CVE-2024-41055, CVE-2024-41078, CVE-2024-42117, CVE-2024-41030, CVE-2024-42068, CVE-2024-42110, CVE-2024-42147, CVE-2024-42121, CVE-2024-41080, CVE-2024-41027, CVE-2024-43858, CVE-2024-42085, CVE-2024-42111, CVE-2024-42238, CVE-2024-41018, CVE-2024-42138, CVE-2024-41038, CVE-2024-42070, CVE-2024-42141, CVE-2024-41098, CVE-2024-42118, CVE-2024-41073, CVE-2024-42144, CVE-2024-42280, CVE-2024-41049, CVE-2024-42076, CVE-2024-41065, CVE-2024-42063, CVE-2024-41064, CVE-2024-41017, CVE-2024-42112, CVE-2024-42064, CVE-2024-42135, CVE-2024-42146, CVE-2024-41010, CVE-2024-41097, CVE-2024-41012, CVE-2024-42097, CVE-2024-42067, CVE-2024-42236, CVE-2024-42080, CVE-2024-42241, CVE-2024-42065, CVE-2024-42232, CVE-2024-42246, CVE-2024-41093, CVE-2024-41015, CVE-2024-42129, CVE-2024-42073, CVE-2024-41029) Update Instructions: Run `sudo pro fix USN-7089-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-48-generic - 6.8.0-48.48 linux-buildinfo-6.8.0-48-generic-64k - 6.8.0-48.48 linux-cloud-tools-6.8.0-48 - 6.8.0-48.48 linux-cloud-tools-6.8.0-48-generic - 6.8.0-48.48 linux-cloud-tools-common - 6.8.0-48.48 linux-cloud-tools-generic - 6.8.0-48.48 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-48.48 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-48.48 linux-cloud-tools-virtual - 6.8.0-48.48 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-48.48 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-crashdump - 6.8.0-48.48 linux-doc - 6.8.0-48.48 linux-generic - 6.8.0-48.48 linux-generic-64k - 6.8.0-48.48 linux-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-generic-hwe-24.04 - 6.8.0-48.48 linux-generic-hwe-24.04-edge - 6.8.0-48.48 linux-generic-lpae - 6.8.0-48.48 linux-headers-6.8.0-48 - 6.8.0-48.48 linux-headers-6.8.0-48-generic - 6.8.0-48.48 linux-headers-6.8.0-48-generic-64k - 6.8.0-48.48 linux-headers-generic - 6.8.0-48.48 linux-headers-generic-64k - 6.8.0-48.48 linux-headers-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-headers-generic-hwe-24.04 - 6.8.0-48.48 linux-headers-generic-hwe-24.04-edge - 6.8.0-48.48 linux-headers-generic-lpae - 6.8.0-48.48 linux-headers-kvm - 6.8.0-48.48 linux-headers-laptop-23.10 - 6.8.0-48.48 linux-headers-oem-20.04 - 6.8.0-48.48 linux-headers-oem-20.04b - 6.8.0-48.48 linux-headers-oem-20.04c - 6.8.0-48.48 linux-headers-oem-20.04d - 6.8.0-48.48 linux-headers-oem-22.04 - 6.8.0-48.48 linux-headers-virtual - 6.8.0-48.48 linux-headers-virtual-hwe-24.04 - 6.8.0-48.48 linux-headers-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-image-6.8.0-48-generic - 6.8.0-48.48 linux-image-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-extra-virtual - 6.8.0-48.48 linux-image-extra-virtual-hwe-24.04 - 6.8.0-48.48 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic - 6.8.0-48.48 linux-image-generic-64k - 6.8.0-48.48 linux-image-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic-hwe-24.04 - 6.8.0-48.48 linux-image-generic-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic-lpae - 6.8.0-48.48 linux-image-kvm - 6.8.0-48.48 linux-image-laptop-23.10 - 6.8.0-48.48 linux-image-oem-20.04 - 6.8.0-48.48 linux-image-oem-20.04b - 6.8.0-48.48 linux-image-oem-20.04c - 6.8.0-48.48 linux-image-oem-20.04d - 6.8.0-48.48 linux-image-oem-22.04 - 6.8.0-48.48 linux-image-uc-6.8.0-48-generic - 6.8.0-48.48 linux-image-uc-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-uc-generic - 6.8.0-48.48 linux-image-uc-generic-hwe-24.04 - 6.8.0-48.48 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-48.48 linux-image-unsigned-6.8.0-48-generic - 6.8.0-48.48 linux-image-unsigned-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-virtual - 6.8.0-48.48 linux-image-virtual-hwe-24.04 - 6.8.0-48.48 linux-image-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-kvm - 6.8.0-48.48 linux-laptop-23.10 - 6.8.0-48.48 linux-lib-rust-6.8.0-48-generic - 6.8.0-48.48 linux-libc-dev - 6.8.0-48.48 linux-modules-6.8.0-48-generic - 6.8.0-48.48 linux-modules-6.8.0-48-generic-64k - 6.8.0-48.48 linux-modules-extra-6.8.0-48-generic - 6.8.0-48.48 linux-modules-ipu6-6.8.0-48-generic - 6.8.0-48.48 linux-modules-ipu6-generic - 6.8.0-48.48 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-48.48 linux-modules-iwlwifi-6.8.0-48-generic - 6.8.0-48.48 linux-modules-iwlwifi-generic - 6.8.0-48.48 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-48.48 linux-modules-iwlwifi-oem-20.04 - 6.8.0-48.48 linux-modules-iwlwifi-oem-20.04d - 6.8.0-48.48 linux-modules-iwlwifi-oem-22.04 - 6.8.0-48.48 linux-modules-usbio-6.8.0-48-generic - 6.8.0-48.48 linux-modules-usbio-generic - 6.8.0-48.48 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-48.48 linux-oem-20.04 - 6.8.0-48.48 linux-oem-20.04b - 6.8.0-48.48 linux-oem-20.04c - 6.8.0-48.48 linux-oem-20.04d - 6.8.0-48.48 linux-oem-22.04 - 6.8.0-48.48 linux-source - 6.8.0-48.48 linux-source-6.8.0 - 6.8.0-48.48 linux-tools-6.8.0-48 - 6.8.0-48.48 linux-tools-6.8.0-48-generic - 6.8.0-48.48 linux-tools-6.8.0-48-generic-64k - 6.8.0-48.48 linux-tools-common - 6.8.0-48.48 linux-tools-generic - 6.8.0-48.48 linux-tools-generic-64k - 6.8.0-48.48 linux-tools-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-tools-generic-hwe-24.04 - 6.8.0-48.48 linux-tools-generic-hwe-24.04-edge - 6.8.0-48.48 linux-tools-generic-lpae - 6.8.0-48.48 linux-tools-host - 6.8.0-48.48 linux-tools-kvm - 6.8.0-48.48 linux-tools-laptop-23.10 - 6.8.0-48.48 linux-tools-oem-20.04 - 6.8.0-48.48 linux-tools-oem-20.04b - 6.8.0-48.48 linux-tools-oem-20.04c - 6.8.0-48.48 linux-tools-oem-20.04d - 6.8.0-48.48 linux-tools-oem-22.04 - 6.8.0-48.48 linux-tools-virtual - 6.8.0-48.48 linux-tools-virtual-hwe-24.04 - 6.8.0-48.48 linux-tools-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-virtual - 6.8.0-48.48 linux-virtual-hwe-24.04 - 6.8.0-48.48 linux-virtual-hwe-24.04-edge - 6.8.0-48.48 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42101, CVE-2024-41052, CVE-2024-42157, CVE-2024-41020, CVE-2024-41055, CVE-2024-42124, CVE-2023-52888, CVE-2024-42079, CVE-2024-43858, CVE-2024-41075, CVE-2024-42073, CVE-2024-42113, CVE-2024-42110, CVE-2024-41080, CVE-2024-42097, CVE-2024-41046, CVE-2024-42076, CVE-2024-41010, CVE-2024-41018, CVE-2024-42115, CVE-2024-41048, CVE-2024-42231, CVE-2024-42241, CVE-2024-41034, CVE-2024-42065, CVE-2024-42140, CVE-2024-42094, CVE-2024-41029, CVE-2024-42225, CVE-2024-41096, CVE-2024-42088, CVE-2024-41087, CVE-2023-52887, CVE-2024-42141, CVE-2024-42135, CVE-2024-42247, CVE-2024-39487, CVE-2024-42229, CVE-2024-42147, CVE-2024-42252, CVE-2024-41038, CVE-2024-41083, CVE-2024-42091, CVE-2024-42156, CVE-2024-42149, CVE-2024-41015, CVE-2024-41047, CVE-2024-42129, CVE-2024-42120, CVE-2024-41097, CVE-2024-42243, CVE-2024-42084, CVE-2024-42250, CVE-2024-41023, CVE-2024-41028, CVE-2024-42108, CVE-2024-41045, CVE-2024-42098, CVE-2024-41064, CVE-2024-42087, CVE-2024-42080, CVE-2024-41049, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-41044, CVE-2024-42126, CVE-2024-42119, CVE-2024-42223, CVE-2024-42280, CVE-2024-42112, CVE-2024-41019, CVE-2024-42133, CVE-2024-42152, CVE-2024-41074, CVE-2024-41042, CVE-2024-41093, CVE-2024-41025, CVE-2024-42253, CVE-2024-42136, CVE-2024-42127, CVE-2024-41036, CVE-2024-42237, CVE-2024-42111, CVE-2024-41031, CVE-2024-41069, CVE-2024-41084, CVE-2024-41076, CVE-2024-41090, CVE-2024-41088, CVE-2024-41070, CVE-2024-42118, CVE-2024-42238, CVE-2024-42234, CVE-2024-41089, CVE-2024-41095, CVE-2024-41085, CVE-2024-42106, CVE-2024-42155, CVE-2024-42146, CVE-2024-42130, CVE-2024-42089, CVE-2024-42132, CVE-2024-41091, CVE-2024-42153, CVE-2024-42236, CVE-2024-42085, CVE-2024-41065, CVE-2024-41032, CVE-2024-42090, CVE-2024-41030, CVE-2024-41017, CVE-2024-42230, CVE-2024-42144, CVE-2024-42137, CVE-2024-41082, CVE-2024-41056, CVE-2024-42145, CVE-2024-41041, CVE-2024-42240, CVE-2024-41081, CVE-2024-42103, CVE-2024-41053, CVE-2024-42070, CVE-2024-42121, CVE-2024-42105, CVE-2024-41022, CVE-2024-42151, CVE-2024-42142, CVE-2024-41035, CVE-2024-42232, CVE-2024-41058, CVE-2024-42109, CVE-2024-41077, CVE-2024-42095, CVE-2024-39486, CVE-2024-42131, CVE-2024-42068, CVE-2024-41073, CVE-2024-41079, CVE-2024-42082, CVE-2024-41071, CVE-2024-41066, CVE-2024-42102, CVE-2024-43855, CVE-2024-41061, CVE-2024-41072, CVE-2024-41059, CVE-2024-41094, CVE-2024-41021, CVE-2024-41098, CVE-2024-42158, CVE-2024-41033, CVE-2024-42096, CVE-2024-42251, CVE-2024-42077, CVE-2024-42063, CVE-2024-42227, CVE-2024-41007, CVE-2024-41057, CVE-2024-41063, CVE-2024-41039, CVE-2024-41067, CVE-2024-41062, CVE-2024-42100, CVE-2024-42074, CVE-2024-42064, CVE-2024-41092, CVE-2024-42128, CVE-2024-41086, CVE-2024-41054, CVE-2024-42239, CVE-2024-41027, CVE-2024-42093, CVE-2024-42244, CVE-2024-41050, CVE-2024-41012, CVE-2024-42246, CVE-2024-42117, CVE-2024-42069, CVE-2024-42067, CVE-2024-42086, CVE-2024-42066, CVE-2024-41060, CVE-2024-42248, CVE-2024-41068, CVE-2024-42161, CVE-2024-42092, CVE-2024-42245, CVE-2024-41078, CVE-2024-42235, CVE-2024-42150, CVE-2024-41051, CVE-2024-42138) Update Instructions: Run `sudo pro fix USN-7089-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-ibm - 6.8.0-1014.14 linux-headers-ibm-classic - 6.8.0-1014.14 linux-headers-ibm-lts-24.04 - 6.8.0-1014.14 linux-ibm - 6.8.0-1014.14 linux-ibm-classic - 6.8.0-1014.14 linux-ibm-lts-24.04 - 6.8.0-1014.14 linux-image-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-ibm - 6.8.0-1014.14 linux-image-ibm-classic - 6.8.0-1014.14 linux-image-ibm-lts-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-classic - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1014.14 linux-tools-ibm - 6.8.0-1014.14 linux-tools-ibm-classic - 6.8.0-1014.14 linux-tools-ibm-lts-24.04 - 6.8.0-1014.14 No subscription required linux-buildinfo-6.8.0-1015-ibm - 6.8.0-1015.15 linux-headers-6.8.0-1015-ibm - 6.8.0-1015.15 linux-ibm-cloud-tools-common - 6.8.0-1015.15 linux-ibm-headers-6.8.0-1015 - 6.8.0-1015.15 linux-ibm-source-6.8.0 - 6.8.0-1015.15 linux-ibm-tools-6.8.0-1015 - 6.8.0-1015.15 linux-image-unsigned-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-extra-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-iwlwifi-6.8.0-1015-ibm - 6.8.0-1015.15 linux-tools-6.8.0-1015-ibm - 6.8.0-1015.15 No subscription required linux-azure - 6.8.0-1016.18 linux-azure-fde - 6.8.0-1016.18 linux-cloud-tools-azure - 6.8.0-1016.18 linux-gcp - 6.8.0-1016.18 linux-headers-azure - 6.8.0-1016.18 linux-headers-gcp - 6.8.0-1016.18 linux-image-6.8.0-1016-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure-fde - 6.8.0-1016.18 linux-image-6.8.0-1016-gcp - 6.8.0-1016.18 linux-image-azure - 6.8.0-1016.18 linux-image-azure-fde - 6.8.0-1016.18 linux-image-gcp - 6.8.0-1016.18 linux-modules-extra-azure - 6.8.0-1016.18 linux-modules-extra-gcp - 6.8.0-1016.18 linux-modules-involflt-azure - 6.8.0-1016.18 linux-modules-iwlwifi-azure - 6.8.0-1016.18 linux-tools-azure - 6.8.0-1016.18 linux-tools-gcp - 6.8.0-1016.18 No subscription required linux-buildinfo-6.8.0-1017-gcp - 6.8.0-1017.19 linux-gcp-headers-6.8.0-1017 - 6.8.0-1017.19 linux-gcp-tools-6.8.0-1017 - 6.8.0-1017.19 linux-headers-6.8.0-1017-gcp - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-gcp - 6.8.0-1017.19 linux-modules-6.8.0-1017-gcp - 6.8.0-1017.19 linux-modules-extra-6.8.0-1017-gcp - 6.8.0-1017.19 linux-tools-6.8.0-1017-gcp - 6.8.0-1017.19 No subscription required linux-azure-cloud-tools-6.8.0-1017 - 6.8.0-1017.20 linux-azure-headers-6.8.0-1017 - 6.8.0-1017.20 linux-azure-tools-6.8.0-1017 - 6.8.0-1017.20 linux-buildinfo-6.8.0-1017-azure - 6.8.0-1017.20 linux-cloud-tools-6.8.0-1017-azure - 6.8.0-1017.20 linux-headers-6.8.0-1017-azure - 6.8.0-1017.20 linux-image-unsigned-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-extra-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-involflt-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-iwlwifi-6.8.0-1017-azure - 6.8.0-1017.20 linux-tools-6.8.0-1017-azure - 6.8.0-1017.20 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42239, CVE-2024-42079, CVE-2024-41080, CVE-2024-42064, CVE-2024-42127, CVE-2024-41049, CVE-2024-41086, CVE-2024-42142, CVE-2024-42244, CVE-2024-41060, CVE-2024-42131, CVE-2024-42085, CVE-2024-42246, CVE-2024-41062, CVE-2024-42115, CVE-2024-42234, CVE-2024-42080, CVE-2024-41095, CVE-2024-41063, CVE-2024-42227, CVE-2024-41089, CVE-2024-42133, CVE-2024-43858, CVE-2024-42135, CVE-2024-42113, CVE-2024-42120, CVE-2024-42149, CVE-2024-42132, CVE-2024-41038, CVE-2024-41069, CVE-2024-41090, CVE-2024-41059, CVE-2024-41028, CVE-2024-42126, CVE-2024-42121, CVE-2024-42155, CVE-2024-42110, CVE-2024-41021, CVE-2024-41044, CVE-2024-42098, CVE-2024-42235, CVE-2024-41083, CVE-2024-41065, CVE-2024-42094, CVE-2024-42229, CVE-2024-42240, CVE-2024-42225, CVE-2024-42230, CVE-2024-41088, CVE-2024-42073, CVE-2024-42145, CVE-2024-42076, CVE-2024-42087, CVE-2024-42241, CVE-2024-41019, CVE-2024-41052, CVE-2024-42093, CVE-2024-42063, CVE-2024-41039, CVE-2024-42106, CVE-2024-42108, CVE-2024-42237, CVE-2024-41048, CVE-2024-41033, CVE-2023-52888, CVE-2024-41096, CVE-2024-41032, CVE-2024-41091, CVE-2024-42238, CVE-2024-41056, CVE-2024-42091, CVE-2024-42088, CVE-2024-41047, CVE-2024-42271, CVE-2024-41064, CVE-2024-42223, CVE-2024-42129, CVE-2024-42102, CVE-2024-42146, CVE-2024-42138, CVE-2024-41079, CVE-2024-42232, CVE-2024-42112, CVE-2024-39487, CVE-2024-42245, CVE-2024-41093, CVE-2024-41066, CVE-2024-43855, CVE-2024-41055, CVE-2024-42100, CVE-2024-41053, CVE-2024-42069, CVE-2024-42252, CVE-2024-42243, CVE-2024-42124, CVE-2024-41054, CVE-2024-42151, CVE-2024-42118, CVE-2024-42251, CVE-2024-42137, CVE-2024-41071, CVE-2024-41010, CVE-2024-41087, CVE-2024-41050, CVE-2024-42068, CVE-2024-42158, CVE-2024-41075, CVE-2024-42141, CVE-2024-42236, CVE-2024-41068, CVE-2024-42157, CVE-2024-42140, CVE-2024-41058, CVE-2024-41076, CVE-2024-42097, CVE-2024-41029, CVE-2024-41097, CVE-2024-42109, CVE-2024-41051, CVE-2024-41061, CVE-2024-42156, CVE-2024-42101, CVE-2024-41031, CVE-2024-41017, CVE-2024-42247, CVE-2024-42128, CVE-2024-41085, CVE-2024-41072, CVE-2024-42248, CVE-2024-41045, CVE-2024-42104, CVE-2024-42253, CVE-2024-42117, CVE-2024-41078, CVE-2024-42130, CVE-2024-42090, CVE-2024-42280, CVE-2024-42250, CVE-2024-42231, CVE-2024-41042, CVE-2024-42077, CVE-2024-42153, CVE-2024-41015, CVE-2024-41035, CVE-2024-41082, CVE-2024-42114, CVE-2024-41007, CVE-2024-41073, CVE-2024-42161, CVE-2024-42082, CVE-2024-42150, CVE-2024-42111, CVE-2024-42086, CVE-2024-42095, CVE-2024-41025, CVE-2024-41081, CVE-2024-42105, CVE-2024-41027, CVE-2024-42089, CVE-2024-39486, CVE-2024-41084, CVE-2024-42092, CVE-2024-42152, CVE-2024-41022, CVE-2024-41077, CVE-2024-41098, CVE-2024-41023, CVE-2024-42066, CVE-2024-41034, CVE-2024-41037, CVE-2024-41046, CVE-2023-52887, CVE-2024-42147, CVE-2024-42065, CVE-2024-42096, CVE-2024-41018, CVE-2024-42067, CVE-2024-41041, CVE-2024-42103, CVE-2024-42084, CVE-2024-42074, CVE-2024-41094, CVE-2024-42119, CVE-2024-41012, CVE-2024-41020, CVE-2024-41074, CVE-2024-42144, CVE-2024-41067, CVE-2024-42070, CVE-2024-41057, CVE-2024-41036, CVE-2024-42136, CVE-2024-41030, CVE-2024-41070, CVE-2024-41092) Update Instructions: Run `sudo pro fix USN-7089-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1015-oracle - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-headers-6.8.0-1015-oracle - 6.8.0-1015.16 linux-headers-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-headers-oracle - 6.8.0-1015.16 linux-headers-oracle-64k - 6.8.0-1015.16 linux-image-6.8.0-1015-oracle - 6.8.0-1015.16 linux-image-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-image-oracle - 6.8.0-1015.16 linux-image-oracle-64k - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-oracle - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-modules-6.8.0-1015-oracle - 6.8.0-1015.16 linux-modules-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-oracle - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-oracle - 6.8.0-1015.16 linux-oracle-64k - 6.8.0-1015.16 linux-oracle-headers-6.8.0-1015 - 6.8.0-1015.16 linux-oracle-tools-6.8.0-1015 - 6.8.0-1015.16 linux-tools-6.8.0-1015-oracle - 6.8.0-1015.16 linux-tools-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-tools-oracle - 6.8.0-1015.16 linux-tools-oracle-64k - 6.8.0-1015.16 No subscription required linux-aws - 6.8.0-1018.20 linux-aws-cloud-tools-6.8.0-1018 - 6.8.0-1018.20 linux-aws-headers-6.8.0-1018 - 6.8.0-1018.20 linux-aws-tools-6.8.0-1018 - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-aws - 6.8.0-1018.20 linux-cloud-tools-6.8.0-1018-aws - 6.8.0-1018.20 linux-headers-6.8.0-1018-aws - 6.8.0-1018.20 linux-headers-aws - 6.8.0-1018.20 linux-image-6.8.0-1018-aws - 6.8.0-1018.20 linux-image-aws - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-extra-aws - 6.8.0-1018.20 linux-tools-6.8.0-1018-aws - 6.8.0-1018.20 linux-tools-aws - 6.8.0-1018.20 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-4 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-41064, CVE-2024-41087, CVE-2023-52888, CVE-2024-42098, CVE-2024-42111, CVE-2024-42076, CVE-2024-42088, CVE-2024-42135, CVE-2024-42145, CVE-2024-42142, CVE-2024-41036, CVE-2024-41071, CVE-2024-41012, CVE-2024-42091, CVE-2024-42253, CVE-2024-42119, CVE-2024-42097, CVE-2024-42243, CVE-2024-39487, CVE-2024-42235, CVE-2024-42120, CVE-2024-42149, CVE-2024-41015, CVE-2024-41074, CVE-2024-42067, CVE-2024-42090, CVE-2024-42128, CVE-2024-41038, CVE-2024-42113, CVE-2024-42102, CVE-2024-42231, CVE-2024-42080, CVE-2024-42241, CVE-2024-42106, CVE-2024-42130, CVE-2024-42073, CVE-2024-42153, CVE-2024-42156, CVE-2024-42118, CVE-2024-41007, CVE-2024-41049, CVE-2024-39486, CVE-2024-42240, CVE-2024-41018, CVE-2024-42251, CVE-2024-42280, CVE-2024-42096, CVE-2024-42121, CVE-2024-42246, CVE-2024-42092, CVE-2024-41090, CVE-2024-42157, CVE-2024-43858, CVE-2024-42150, CVE-2024-42110, CVE-2024-41010, CVE-2024-41081, CVE-2024-41061, CVE-2024-41078, CVE-2024-41094, CVE-2024-41039, CVE-2024-42114, CVE-2024-42109, CVE-2024-41030, CVE-2024-42066, CVE-2024-41035, CVE-2024-42146, CVE-2024-42131, CVE-2024-41059, CVE-2024-41067, CVE-2024-42138, CVE-2024-41050, CVE-2024-41034, CVE-2024-41077, CVE-2024-41076, CVE-2024-41088, CVE-2024-41096, CVE-2024-41073, CVE-2024-41037, CVE-2024-42232, CVE-2024-41063, CVE-2024-42117, CVE-2024-42155, CVE-2024-41080, CVE-2024-42132, CVE-2024-42084, CVE-2024-42136, CVE-2024-42223, CVE-2024-41068, CVE-2024-42225, CVE-2024-42065, CVE-2024-41051, CVE-2024-43855, CVE-2024-42238, CVE-2024-42250, CVE-2024-42112, CVE-2024-41070, CVE-2023-52887, CVE-2024-42094, CVE-2024-42095, CVE-2024-41086, CVE-2024-41020, CVE-2024-41082, CVE-2024-42115, CVE-2024-42152, CVE-2024-42239, CVE-2024-42093, CVE-2024-42126, CVE-2024-41022, CVE-2024-41017, CVE-2024-41092, CVE-2024-41044, CVE-2024-42140, CVE-2024-41029, CVE-2024-41054, CVE-2024-42158, CVE-2024-41066, CVE-2024-42244, CVE-2024-42070, CVE-2024-41025, CVE-2024-42229, CVE-2024-42085, CVE-2024-41084, CVE-2024-41060, CVE-2024-41062, CVE-2024-42105, CVE-2024-42124, CVE-2024-41045, CVE-2024-42227, CVE-2024-41047, CVE-2024-41042, CVE-2024-42100, CVE-2024-42247, CVE-2024-41041, CVE-2024-42087, CVE-2024-42252, CVE-2024-41058, CVE-2024-42063, CVE-2024-42271, CVE-2024-41027, CVE-2024-42079, CVE-2024-42104, CVE-2024-41098, CVE-2024-41033, CVE-2024-41072, CVE-2024-41031, CVE-2024-42089, CVE-2024-41032, CVE-2024-42127, CVE-2024-41093, CVE-2024-42082, CVE-2024-41023, CVE-2024-41075, CVE-2024-42151, CVE-2024-42141, CVE-2024-42108, CVE-2024-42068, CVE-2024-41085, CVE-2024-42103, CVE-2024-41057, CVE-2024-42064, CVE-2024-42161, CVE-2024-41052, CVE-2024-41053, CVE-2024-42069, CVE-2024-41021, CVE-2024-42147, CVE-2024-41065, CVE-2024-41091, CVE-2024-41079, CVE-2024-42086, CVE-2024-42234, CVE-2024-41055, CVE-2024-41083, CVE-2024-42101, CVE-2024-42230, CVE-2024-41095, CVE-2024-41019, CVE-2024-42245, CVE-2024-42129, CVE-2024-42144, CVE-2024-42236, CVE-2024-41028, CVE-2024-42077, CVE-2024-42248, CVE-2024-41046, CVE-2024-42133, CVE-2024-42074, CVE-2024-41089, CVE-2024-42237, CVE-2024-41056, CVE-2024-41048, CVE-2024-42137, CVE-2024-41069, CVE-2024-41097) Update Instructions: Run `sudo pro fix USN-7089-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1016-oem - 6.8.0-1016.16 linux-headers-6.8.0-1016-oem - 6.8.0-1016.16 linux-headers-oem-24.04 - 6.8.0-1016.16 linux-headers-oem-24.04a - 6.8.0-1016.16 linux-image-6.8.0-1016-oem - 6.8.0-1016.16 linux-image-oem-24.04 - 6.8.0-1016.16 linux-image-oem-24.04a - 6.8.0-1016.16 linux-image-uc-6.8.0-1016-oem - 6.8.0-1016.16 linux-image-uc-oem-24.04 - 6.8.0-1016.16 linux-image-uc-oem-24.04a - 6.8.0-1016.16 linux-image-unsigned-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-ipu6-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-ipu6-oem-24.04 - 6.8.0-1016.16 linux-modules-ipu6-oem-24.04a - 6.8.0-1016.16 linux-modules-iwlwifi-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1016.16 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1016.16 linux-modules-usbio-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-usbio-oem-24.04 - 6.8.0-1016.16 linux-modules-usbio-oem-24.04a - 6.8.0-1016.16 linux-oem-24.04 - 6.8.0-1016.16 linux-oem-24.04a - 6.8.0-1016.16 linux-oem-6.8-headers-6.8.0-1016 - 6.8.0-1016.16 linux-oem-6.8-tools-6.8.0-1016 - 6.8.0-1016.16 linux-tools-6.8.0-1016-oem - 6.8.0-1016.16 linux-tools-oem-24.04 - 6.8.0-1016.16 linux-tools-oem-24.04a - 6.8.0-1016.16 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-5 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42223, CVE-2024-42244, CVE-2024-42105, CVE-2024-42100, CVE-2024-42235, CVE-2024-41007, CVE-2024-41047, CVE-2024-42088, CVE-2024-42079, CVE-2024-41053, CVE-2024-41094, CVE-2024-42227, CVE-2024-42253, CVE-2024-42150, CVE-2024-41049, CVE-2024-42096, CVE-2024-42093, CVE-2024-41079, CVE-2024-41037, CVE-2024-42129, CVE-2024-41031, CVE-2024-39486, CVE-2024-41065, CVE-2024-42101, CVE-2024-41082, CVE-2024-42135, CVE-2024-42236, CVE-2024-41078, CVE-2024-42098, CVE-2024-41056, CVE-2024-41096, CVE-2024-41074, CVE-2024-42246, CVE-2024-42137, CVE-2024-42232, CVE-2024-42121, CVE-2024-41093, CVE-2024-41076, CVE-2024-42157, CVE-2024-41062, CVE-2024-42104, CVE-2024-42085, CVE-2024-41092, CVE-2024-41034, CVE-2024-41036, CVE-2024-41072, CVE-2024-41012, CVE-2024-39487, CVE-2024-42124, CVE-2024-42065, CVE-2024-41061, CVE-2024-41064, CVE-2024-41091, CVE-2024-42119, CVE-2024-41088, CVE-2024-42089, CVE-2024-41048, CVE-2024-41032, CVE-2024-41020, CVE-2024-42066, CVE-2024-42068, CVE-2024-42238, CVE-2024-41069, CVE-2024-41044, CVE-2024-41025, CVE-2024-42161, CVE-2023-52887, CVE-2024-42127, CVE-2024-42239, CVE-2024-42149, CVE-2024-42091, CVE-2024-42097, CVE-2024-41054, CVE-2024-41041, CVE-2024-42131, CVE-2024-41089, CVE-2024-41018, CVE-2024-42067, CVE-2024-41039, CVE-2024-42128, CVE-2024-42248, CVE-2024-41090, CVE-2024-42073, CVE-2024-43858, CVE-2024-42225, CVE-2024-42077, CVE-2024-42247, CVE-2024-42109, CVE-2024-41045, CVE-2024-41019, CVE-2024-42231, CVE-2024-41017, CVE-2024-42145, CVE-2024-41046, CVE-2024-42063, CVE-2024-41087, CVE-2024-41033, CVE-2024-41021, CVE-2024-42241, CVE-2024-42229, CVE-2024-41015, CVE-2024-42087, CVE-2024-42133, CVE-2024-41073, CVE-2024-42070, CVE-2024-41067, CVE-2024-41077, CVE-2024-42102, CVE-2024-42158, CVE-2024-42126, CVE-2024-41042, CVE-2024-41055, CVE-2024-42092, CVE-2024-42114, CVE-2024-41059, CVE-2024-41058, CVE-2024-41071, CVE-2024-42144, CVE-2024-42146, CVE-2024-41084, CVE-2024-42155, CVE-2024-42245, CVE-2024-42156, CVE-2024-41050, CVE-2024-42141, CVE-2024-42095, CVE-2024-41097, CVE-2024-42103, CVE-2024-42152, CVE-2024-42140, CVE-2024-41023, CVE-2024-41083, CVE-2024-42138, CVE-2024-42271, CVE-2024-42252, CVE-2024-42237, CVE-2024-42132, CVE-2024-41098, CVE-2024-42086, CVE-2024-41063, CVE-2024-42153, CVE-2024-41070, CVE-2024-42115, CVE-2024-42111, CVE-2024-42142, CVE-2024-42069, CVE-2024-41027, CVE-2024-42130, CVE-2024-42090, CVE-2024-42251, CVE-2024-42118, CVE-2024-41060, CVE-2024-41029, CVE-2024-41095, CVE-2024-41038, CVE-2024-42243, CVE-2024-42112, CVE-2024-41035, CVE-2024-42240, CVE-2024-41066, CVE-2024-41085, CVE-2024-42082, CVE-2024-42117, CVE-2024-42250, CVE-2024-41080, CVE-2024-42147, CVE-2024-41081, CVE-2024-42113, CVE-2023-52888, CVE-2024-42136, CVE-2024-41057, CVE-2024-41086, CVE-2024-42064, CVE-2024-42234, CVE-2024-42076, CVE-2024-42084, CVE-2024-42094, CVE-2024-42230, CVE-2024-41068, CVE-2024-43855, CVE-2024-42080, CVE-2024-41052, CVE-2024-41051, CVE-2024-42074, CVE-2024-41010, CVE-2024-41028, CVE-2024-41030, CVE-2024-41022, CVE-2024-42120, CVE-2024-42108, CVE-2024-41075, CVE-2024-42106, CVE-2024-42280, CVE-2024-42110, CVE-2024-42151) Update Instructions: Run `sudo pro fix USN-7089-5` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1014-raspi - 6.8.0-1014.16 linux-headers-6.8.0-1014-raspi - 6.8.0-1014.16 linux-headers-raspi - 6.8.0-1014.16 linux-image-6.8.0-1014-raspi - 6.8.0-1014.16 linux-image-raspi - 6.8.0-1014.16 linux-modules-6.8.0-1014-raspi - 6.8.0-1014.16 linux-raspi - 6.8.0-1014.16 linux-raspi-headers-6.8.0-1014 - 6.8.0-1014.16 linux-raspi-tools-6.8.0-1014 - 6.8.0-1014.16 linux-tools-6.8.0-1014-raspi - 6.8.0-1014.16 linux-tools-raspi - 6.8.0-1014.16 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-6 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-41062, CVE-2024-41029, CVE-2024-42142, CVE-2024-41070, CVE-2024-41066, CVE-2024-42150, CVE-2024-42120, CVE-2023-52888, CVE-2024-42141, CVE-2024-41032, CVE-2024-42245, CVE-2024-41053, CVE-2024-42247, CVE-2024-42161, CVE-2024-42094, CVE-2024-41072, CVE-2024-42076, CVE-2024-42091, CVE-2024-42103, CVE-2024-41007, CVE-2024-42064, CVE-2024-41075, CVE-2024-42157, CVE-2024-42069, CVE-2024-41045, CVE-2024-42068, CVE-2024-42090, CVE-2024-41071, CVE-2024-42082, CVE-2024-42146, CVE-2024-41018, CVE-2024-42238, CVE-2024-41079, CVE-2024-42241, CVE-2024-42067, CVE-2024-42132, CVE-2024-42121, CVE-2024-41025, CVE-2024-42231, CVE-2024-42225, CVE-2024-41080, CVE-2024-41086, CVE-2024-41012, CVE-2024-42234, CVE-2024-41088, CVE-2024-42129, CVE-2024-42158, CVE-2024-41078, CVE-2024-41038, CVE-2024-41055, CVE-2024-42106, CVE-2024-42227, CVE-2024-42102, CVE-2024-41082, CVE-2024-42108, CVE-2024-41085, CVE-2024-41020, CVE-2024-41054, CVE-2024-42085, CVE-2024-42140, CVE-2024-42089, CVE-2024-41047, CVE-2024-42092, CVE-2024-41044, CVE-2024-42246, CVE-2024-41035, CVE-2024-42250, CVE-2024-42070, CVE-2024-41039, CVE-2024-41061, CVE-2024-42147, CVE-2024-42104, CVE-2024-41090, CVE-2024-41096, CVE-2024-41063, CVE-2024-41084, CVE-2024-41059, CVE-2024-41097, CVE-2024-41089, CVE-2024-42093, CVE-2024-42126, CVE-2024-42135, CVE-2024-42128, CVE-2024-42098, CVE-2024-42105, CVE-2024-42124, CVE-2024-42101, CVE-2024-41091, CVE-2024-42127, CVE-2024-41077, CVE-2024-42111, CVE-2024-41037, CVE-2024-42136, CVE-2024-41083, CVE-2024-42243, CVE-2024-41033, CVE-2024-41046, CVE-2024-42230, CVE-2024-42080, CVE-2024-42096, CVE-2024-42100, CVE-2024-42236, CVE-2024-41022, CVE-2024-42086, CVE-2024-42251, CVE-2024-41015, CVE-2024-41027, CVE-2024-42155, CVE-2024-42117, CVE-2024-41036, CVE-2024-42133, CVE-2024-41010, CVE-2024-42151, CVE-2024-42118, CVE-2024-39486, CVE-2024-42066, CVE-2024-42131, CVE-2024-42223, CVE-2024-41081, CVE-2024-42244, CVE-2024-41073, CVE-2024-42114, CVE-2024-42252, CVE-2024-42248, CVE-2024-42110, CVE-2024-41051, CVE-2023-52887, CVE-2024-42156, CVE-2024-41074, CVE-2024-41017, CVE-2024-42079, CVE-2024-41034, CVE-2024-41028, CVE-2024-42109, CVE-2024-42235, CVE-2024-41058, CVE-2024-42232, CVE-2024-42084, CVE-2024-41076, CVE-2024-41030, CVE-2024-41023, CVE-2024-42271, CVE-2024-41050, CVE-2024-41042, CVE-2024-41031, CVE-2024-42112, CVE-2024-41092, CVE-2024-42253, CVE-2024-42152, CVE-2024-41049, CVE-2024-42237, CVE-2024-41095, CVE-2024-42280, CVE-2024-42153, CVE-2024-42115, CVE-2024-42130, CVE-2024-41064, CVE-2024-42077, CVE-2024-41067, CVE-2024-42137, CVE-2024-41019, CVE-2024-42240, CVE-2024-41093, CVE-2024-41048, CVE-2024-42063, CVE-2024-42113, CVE-2024-42145, CVE-2024-42073, CVE-2024-43858, CVE-2024-42088, CVE-2024-41069, CVE-2024-41068, CVE-2024-42138, CVE-2024-41065, CVE-2024-42087, CVE-2024-42239, CVE-2024-42149, CVE-2024-41021, CVE-2024-42065, CVE-2024-39487, CVE-2024-41052, CVE-2024-42095, CVE-2024-42074, CVE-2024-42097, CVE-2024-41098, CVE-2024-41057, CVE-2024-41060, CVE-2024-42119, CVE-2024-42229, CVE-2024-43855, CVE-2024-41056, CVE-2024-41041, CVE-2024-42144, CVE-2024-41087, CVE-2024-41094) Update Instructions: Run `sudo pro fix USN-7089-6` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-gke - 6.8.0-1013.17 linux-gke - 6.8.0-1013.17 linux-gke-headers-6.8.0-1013 - 6.8.0-1013.17 linux-gke-tools-6.8.0-1013 - 6.8.0-1013.17 linux-headers-6.8.0-1013-gke - 6.8.0-1013.17 linux-headers-gke - 6.8.0-1013.17 linux-image-6.8.0-1013-gke - 6.8.0-1013.17 linux-image-gke - 6.8.0-1013.17 linux-image-unsigned-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-extra-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-iwlwifi-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-iwlwifi-gke - 6.8.0-1013.17 linux-tools-6.8.0-1013-gke - 6.8.0-1013.17 linux-tools-gke - 6.8.0-1013.17 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7089-7 -- Linux kernel (Low Latency) vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42084, CVE-2024-42252, CVE-2024-41096, CVE-2024-42237, CVE-2024-42140, CVE-2024-42150, CVE-2024-41031, CVE-2024-41059, CVE-2024-41062, CVE-2024-41051, CVE-2024-41028, CVE-2024-41090, CVE-2024-41092, CVE-2024-43855, CVE-2024-41021, CVE-2024-42229, CVE-2024-41056, CVE-2024-41048, CVE-2024-41036, CVE-2024-42094, CVE-2024-41089, CVE-2024-41068, CVE-2024-41039, CVE-2024-41095, CVE-2024-41069, CVE-2024-42234, CVE-2024-42136, CVE-2024-41025, CVE-2024-42157, CVE-2024-42248, CVE-2024-42087, CVE-2024-41041, CVE-2024-42230, CVE-2024-42151, CVE-2024-42130, CVE-2024-42244, CVE-2024-41079, CVE-2024-42253, CVE-2024-42092, CVE-2024-41022, CVE-2024-42137, CVE-2024-42132, CVE-2024-42108, CVE-2024-42155, CVE-2024-42127, CVE-2024-41060, CVE-2024-42074, CVE-2024-41081, CVE-2024-42066, CVE-2024-42098, CVE-2024-42082, CVE-2024-42093, CVE-2024-42245, CVE-2024-41072, CVE-2024-41052, CVE-2024-42161, CVE-2024-42096, CVE-2024-42115, CVE-2024-41074, CVE-2024-42120, CVE-2024-41046, CVE-2024-42239, CVE-2024-41063, CVE-2024-42090, CVE-2024-41023, CVE-2024-42069, CVE-2024-41087, CVE-2024-42158, CVE-2024-41067, CVE-2024-41084, CVE-2024-41077, CVE-2024-42240, CVE-2024-42145, CVE-2024-42102, CVE-2024-41020, CVE-2024-42231, CVE-2024-41053, CVE-2024-42131, CVE-2024-42089, CVE-2024-41083, CVE-2024-42247, CVE-2024-42105, CVE-2024-41044, CVE-2024-42128, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-42106, CVE-2024-41076, CVE-2024-42088, CVE-2024-41057, CVE-2024-41091, CVE-2024-42152, CVE-2024-41070, CVE-2024-41035, CVE-2024-41050, CVE-2024-39487, CVE-2024-42113, CVE-2024-42250, CVE-2024-41047, CVE-2024-42149, CVE-2024-42079, CVE-2024-42091, CVE-2024-42227, CVE-2024-42095, CVE-2024-42109, CVE-2024-41033, CVE-2023-52888, CVE-2024-41061, CVE-2024-42223, CVE-2024-42235, CVE-2024-41086, CVE-2024-42133, CVE-2024-41082, CVE-2024-41071, CVE-2024-41007, CVE-2023-52887, CVE-2024-39486, CVE-2024-41075, CVE-2024-42101, CVE-2024-42077, CVE-2024-41042, CVE-2024-42225, CVE-2024-42126, CVE-2024-41094, CVE-2024-41085, CVE-2024-41019, CVE-2024-41058, CVE-2024-41066, CVE-2024-42156, CVE-2024-42119, CVE-2024-41032, CVE-2024-41088, CVE-2024-42100, CVE-2024-42142, CVE-2024-41054, CVE-2024-42103, CVE-2024-42124, CVE-2024-41034, CVE-2024-42251, CVE-2024-42153, CVE-2024-41045, CVE-2024-42086, CVE-2024-42243, CVE-2024-41055, CVE-2024-41078, CVE-2024-42117, CVE-2024-41030, CVE-2024-42068, CVE-2024-42110, CVE-2024-42147, CVE-2024-42121, CVE-2024-41080, CVE-2024-41027, CVE-2024-43858, CVE-2024-42085, CVE-2024-42111, CVE-2024-42238, CVE-2024-41018, CVE-2024-42138, CVE-2024-41038, CVE-2024-42070, CVE-2024-42141, CVE-2024-41098, CVE-2024-42118, CVE-2024-41073, CVE-2024-42144, CVE-2024-42280, CVE-2024-41049, CVE-2024-42076, CVE-2024-41065, CVE-2024-42063, CVE-2024-41064, CVE-2024-41017, CVE-2024-42112, CVE-2024-42064, CVE-2024-42135, CVE-2024-42146, CVE-2024-41010, CVE-2024-41097, CVE-2024-41012, CVE-2024-42097, CVE-2024-42067, CVE-2024-42236, CVE-2024-42080, CVE-2024-42241, CVE-2024-42065, CVE-2024-42232, CVE-2024-42246, CVE-2024-41093, CVE-2024-41015, CVE-2024-42129, CVE-2024-42073, CVE-2024-41029) Update Instructions: Run `sudo pro fix USN-7089-7` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-buildinfo-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-cloud-tools-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-cloud-tools-lowlatency - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-headers-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-headers-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-headers-lowlatency - 6.8.0-48.48.3 linux-headers-lowlatency-64k - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-image-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-image-lowlatency - 6.8.0-48.48.3 linux-image-lowlatency-64k - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-unsigned-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-image-unsigned-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-lowlatency - 6.8.0-48.48.3 linux-lowlatency-64k - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-lowlatency-cloud-tools-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-cloud-tools-common - 6.8.0-48.48.3 linux-lowlatency-headers-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-lowlatency-lib-rust-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-lowlatency-tools-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-tools-common - 6.8.0-48.48.3 linux-lowlatency-tools-host - 6.8.0-48.48.3 linux-modules-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-modules-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-modules-iwlwifi-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-tools-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-tools-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-tools-lowlatency - 6.8.0-48.48.3 linux-tools-lowlatency-64k - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
USN-7091-1 -- Ruby vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123) It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-41946) It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-49761) Update Instructions: Run `sudo pro fix USN-7091-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.2 - 3.2.3-1ubuntu0.24.04.3 ruby3.2 - 3.2.3-1ubuntu0.24.04.3 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.3 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.3 No subscription required
Medium
CVE-2024-35176
CVE-2024-39908
CVE-2024-41123
CVE-2024-41946
CVE-2024-49761
USN-7092-1 -- mpg123 vulnerability
Ubuntu 24.04 LTS
It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7092-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmpg123-0t64 - 1.32.5-1ubuntu1.1 libmpg123-dev - 1.32.5-1ubuntu1.1 libout123-0t64 - 1.32.5-1ubuntu1.1 libsyn123-0t64 - 1.32.5-1ubuntu1.1 mpg123 - 1.32.5-1ubuntu1.1 No subscription required
Medium
CVE-2024-10573
USN-7093-1 -- Werkzeug vulnerability
Ubuntu 24.04 LTS
It was discovered that Werkzeug incorrectly handled multiple form submission requests. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7093-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-werkzeug-doc - 3.0.1-3ubuntu0.2 python3-werkzeug - 3.0.1-3ubuntu0.2 No subscription required
Medium
CVE-2024-49767
USN-7094-1 -- QEMU vulnerabilities
Ubuntu 24.04 LTS
It was discovered that QEMU incorrectly handled memory during certain VNC operations. A remote attacker could possibly use this issue to cause QEMU to consume resources, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2019-20382) It was discovered that QEMU incorrectly handled certain memory copy operations when loading ROM contents. If a user were tricked into running an untrusted kernel image, a remote attacker could possibly use this issue to run arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-13765) Aviv Sasson discovered that QEMU incorrectly handled Slirp networking. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-1983) It was discovered that the SLiRP networking implementation of the QEMU emulator did not properly manage memory under certain circumstances. An attacker could use this to cause a heap-based buffer overflow or other out- of-bounds access, which can lead to a denial of service (application crash) or potential execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-7039) It was discovered that the SLiRP networking implementation of the QEMU emulator misuses snprintf return values. An attacker could use this to cause a denial of service (application crash) or potentially execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-8608) It was discovered that QEMU SLiRP networking incorrectly handled certain udp packets. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2021-3592, CVE-2021-3594) It was discovered that QEMU had a DMA reentrancy issue, leading to a use-after-free vulnerability. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3019) It was discovered that QEMU had a flaw in Virtio PCI Bindings, leading to a triggerable crash via vhost_net_stop. An attacker inside a guest could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-4693) It was discovered that QEMU incorrectly handled memory in virtio-sound, leading to a heap-based buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-7730) Update Instructions: Run `sudo pro fix USN-7094-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.4 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.4 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.4 qemu-system - 1:8.2.2+ds-0ubuntu1.4 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.4 qemu-system-common - 1:8.2.2+ds-0ubuntu1.4 qemu-system-data - 1:8.2.2+ds-0ubuntu1.4 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.4 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.4 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.4 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.4 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.4 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.4 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.4 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.4 qemu-user - 1:8.2.2+ds-0ubuntu1.4 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.4 qemu-user-static - 1:8.2.2+ds-0ubuntu1.4 qemu-utils - 1:8.2.2+ds-0ubuntu1.4 No subscription required
Medium
CVE-2019-20382
CVE-2020-13765
CVE-2020-1983
CVE-2020-7039
CVE-2020-8608
CVE-2021-3592
CVE-2021-3594
CVE-2023-3019
CVE-2024-4693
CVE-2024-7730
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2084210
USN-7095-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42271, CVE-2024-42068, CVE-2024-42086, CVE-2024-42132, CVE-2024-42074, CVE-2024-41017, CVE-2024-42090, CVE-2024-42280, CVE-2024-41030, CVE-2024-41037, CVE-2024-42248, CVE-2024-42084, CVE-2024-41057, CVE-2024-42252, CVE-2024-41055, CVE-2024-42158, CVE-2024-42097, CVE-2024-42101, CVE-2024-42095, CVE-2024-41084, CVE-2024-41051, CVE-2024-41032, CVE-2024-41046, CVE-2024-42231, CVE-2024-42133, CVE-2024-42089, CVE-2024-41062, CVE-2024-41033, CVE-2024-41012, CVE-2024-41077, CVE-2024-41064, CVE-2024-41082, CVE-2024-41090, CVE-2024-42065, CVE-2024-41096, CVE-2024-42119, CVE-2024-41054, CVE-2024-42064, CVE-2024-42253, CVE-2024-42237, CVE-2024-42120, CVE-2024-41066, CVE-2024-41083, CVE-2024-42129, CVE-2024-41085, CVE-2024-41058, CVE-2024-42146, CVE-2024-42156, CVE-2024-42076, CVE-2024-42149, CVE-2024-42069, CVE-2024-41039, CVE-2024-42110, CVE-2024-42150, CVE-2024-41015, CVE-2024-39486, CVE-2024-42144, CVE-2024-42131, CVE-2024-42087, CVE-2024-42091, CVE-2024-42236, CVE-2024-42088, CVE-2024-42112, CVE-2024-42142, CVE-2024-42082, CVE-2024-42111, CVE-2024-41028, CVE-2024-45001, CVE-2024-42077, CVE-2024-42102, CVE-2024-42239, CVE-2024-42140, CVE-2024-41091, CVE-2024-41050, CVE-2024-41034, CVE-2024-43858, CVE-2024-42145, CVE-2024-42227, CVE-2024-41029, CVE-2024-42230, CVE-2024-42096, CVE-2024-42238, CVE-2024-41027, CVE-2024-42063, CVE-2024-41023, CVE-2024-41041, CVE-2024-41038, CVE-2024-41073, CVE-2024-41067, CVE-2024-41025, CVE-2024-42152, CVE-2024-42247, CVE-2024-41065, CVE-2024-42121, CVE-2024-42157, CVE-2024-42080, CVE-2024-41076, CVE-2024-41059, CVE-2024-42108, CVE-2024-42251, CVE-2024-42093, CVE-2024-42130, CVE-2024-42126, CVE-2024-42079, CVE-2024-42246, CVE-2024-41081, CVE-2024-42092, CVE-2024-43855, CVE-2024-42235, CVE-2024-42118, CVE-2024-42067, CVE-2024-41047, CVE-2024-42155, CVE-2024-41010, CVE-2024-41061, CVE-2024-41007, CVE-2024-42245, CVE-2024-42106, CVE-2024-42066, CVE-2024-41078, CVE-2024-42113, CVE-2024-41087, CVE-2024-41092, CVE-2024-42234, CVE-2024-42124, CVE-2024-42100, CVE-2024-42128, CVE-2024-41072, CVE-2024-41022, CVE-2024-41049, CVE-2024-42229, CVE-2024-42225, CVE-2024-41052, CVE-2024-42151, CVE-2024-41094, CVE-2024-41098, CVE-2024-41035, CVE-2024-41042, CVE-2024-42114, CVE-2024-42250, CVE-2024-41095, CVE-2024-42138, CVE-2024-42241, CVE-2024-42103, CVE-2024-42094, CVE-2024-41045, CVE-2024-41075, CVE-2024-42073, CVE-2024-42153, CVE-2024-41048, CVE-2024-42085, CVE-2024-41074, CVE-2024-42244, CVE-2024-41018, CVE-2024-41079, CVE-2024-42127, CVE-2023-52887, CVE-2023-52888, CVE-2024-41071, CVE-2024-41020, CVE-2024-41036, CVE-2024-42117, CVE-2024-41068, CVE-2024-41056, CVE-2024-39487, CVE-2024-42243, CVE-2024-41019, CVE-2024-41070, CVE-2024-41044, CVE-2024-41060, CVE-2024-41088, CVE-2024-41021, CVE-2024-41053, CVE-2024-42137, CVE-2024-41086, CVE-2024-42104, CVE-2024-42109, CVE-2024-42105, CVE-2024-42136, CVE-2024-41080, CVE-2024-42098, CVE-2024-41093, CVE-2024-41063, CVE-2024-42161, CVE-2024-42147, CVE-2024-42223, CVE-2024-41097, CVE-2024-41069, CVE-2024-42240, CVE-2024-42135, CVE-2024-42070, CVE-2024-41089, CVE-2024-42141, CVE-2024-42115, CVE-2024-41031, CVE-2024-42232) Update Instructions: Run `sudo pro fix USN-7095-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-buildinfo-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-cloud-tools-nvidia - 6.8.0-1017.19 linux-headers-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-headers-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-headers-nvidia - 6.8.0-1017.19 linux-headers-nvidia-64k - 6.8.0-1017.19 linux-image-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-image-nvidia - 6.8.0-1017.19 linux-image-nvidia-64k - 6.8.0-1017.19 linux-image-uc-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-uc-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-extra-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-nvidia-fs-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1017.19 linux-nvidia - 6.8.0-1017.19 linux-nvidia-64k - 6.8.0-1017.19 linux-nvidia-headers-6.8.0-1017 - 6.8.0-1017.19 linux-nvidia-tools-6.8.0-1017 - 6.8.0-1017.19 linux-tools-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-tools-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-tools-nvidia - 6.8.0-1017.19 linux-tools-nvidia-64k - 6.8.0-1017.19 No subscription required linux-buildinfo-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-buildinfo-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-headers-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-uc-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-uc-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-unsigned-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-unsigned-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-extra-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-nvidia-lowlatency - 6.8.0-1017.19.1 linux-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-nvidia-lowlatency-headers-6.8.0-1017 - 6.8.0-1017.19.1 linux-nvidia-lowlatency-tools-6.8.0-1017 - 6.8.0-1017.19.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1017.19.1 linux-tools-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-tools-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-tools-nvidia-lowlatency - 6.8.0-1017.19.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1017.19.1 No subscription required
Medium
CVE-2023-52887
CVE-2023-52888
CVE-2024-25741
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42161
CVE-2024-42223
CVE-2024-42225
CVE-2024-42227
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42271
CVE-2024-42280
CVE-2024-43855
CVE-2024-43858
CVE-2024-45001
USN-7096-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
Andy Boothe discovered that the Networking component of OpenJDK 8 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 8 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 8 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21147) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21094) Yi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 8 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 8 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 8 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20926) It was discovered that OpenJDK 8 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 8 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-7096-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-doc - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jdk - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jdk-headless - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre-headless - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre-zero - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-source - 8u432-ga~us1-0ubuntu2~24.04 No subscription required
Medium
CVE-2024-20918
CVE-2024-20919
CVE-2024-20921
CVE-2024-20926
CVE-2024-20945
CVE-2024-20952
CVE-2024-21011
CVE-2024-21068
CVE-2024-21085
CVE-2024-21094
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
CVE-2024-21208
CVE-2024-21210
CVE-2024-21217
CVE-2024-21235
USN-7096-2 -- OpenJDK 8 regressions
Ubuntu 24.04 LTS
USN-7096-1 fixed vulnerabilities in OpenJDK 8. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andy Boothe discovered that the Networking component of OpenJDK 8 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 8 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 8 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21147) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21094) Yi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 8 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 8 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 8 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20926) It was discovered that OpenJDK 8 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 8 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-7096-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-doc - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jdk - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jdk-headless - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre-headless - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre-zero - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-source - 8u442-b06~us1-0ubuntu1~24.04 No subscription required
None
https://launchpad.net/bugs/2097400
USN-7097-1 -- OpenJDK 11 vulnerabilities
Ubuntu 24.04 LTS
Andy Boothe discovered that the Networking component of OpenJDK 11 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 11 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 11 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 11 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-7097-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.25+9-1ubuntu1~24.04 openjdk-11-doc - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jdk - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre-headless - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre-zero - 11.0.25+9-1ubuntu1~24.04 openjdk-11-source - 11.0.25+9-1ubuntu1~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
CVE-2024-21208
CVE-2024-21210
CVE-2024-21217
CVE-2024-21235
USN-7098-1 -- OpenJDK 17 vulnerabilities
Ubuntu 24.04 LTS
Andy Boothe discovered that the Networking component of OpenJDK 17 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 17 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 17 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 17 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-7098-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.13+11-2ubuntu1~24.04 openjdk-17-doc - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jdk - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jdk-headless - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre-headless - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre-zero - 17.0.13+11-2ubuntu1~24.04 openjdk-17-source - 17.0.13+11-2ubuntu1~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21145
CVE-2024-21147
CVE-2024-21208
CVE-2024-21210
CVE-2024-21217
CVE-2024-21235
USN-7099-1 -- OpenJDK 21 vulnerabilities
Ubuntu 24.04 LTS
Andy Boothe discovered that the Networking component of OpenJDK 21 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 21 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 21 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) Update Instructions: Run `sudo pro fix USN-7099-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.5+11-1ubuntu1~24.04 openjdk-21-doc - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jdk - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jdk-headless - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre-headless - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre-zero - 21.0.5+11-1ubuntu1~24.04 openjdk-21-source - 21.0.5+11-1ubuntu1~24.04 openjdk-21-testsupport - 21.0.5+11-1ubuntu1~24.04 No subscription required
Medium
CVE-2024-21208
CVE-2024-21210
CVE-2024-21217
CVE-2024-21235
USN-7102-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.40 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-40.html https://www.oracle.com/security-alerts/cpuoct2024.html Update Instructions: Run `sudo pro fix USN-7102-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.40-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.40-0ubuntu0.24.04.1 mysql-client - 8.0.40-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-router - 8.0.40-0ubuntu0.24.04.1 mysql-server - 8.0.40-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-testsuite - 8.0.40-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.40-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-21193
CVE-2024-21194
CVE-2024-21196
CVE-2024-21197
CVE-2024-21198
CVE-2024-21199
CVE-2024-21201
CVE-2024-21212
CVE-2024-21213
CVE-2024-21219
CVE-2024-21230
CVE-2024-21231
CVE-2024-21236
CVE-2024-21237
CVE-2024-21239
CVE-2024-21241
USN-7103-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-46951, CVE-2024-46953, CVE-2024-46955, CVE-2024-46956) It was discovered that Ghostscript incorrectly handled parsing certain PDF files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-46952) It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly bypass file path validation. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-46954) Update Instructions: Run `sudo pro fix USN-7103-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.4 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.4 libgs-common - 10.02.1~dfsg1-0ubuntu7.4 libgs-dev - 10.02.1~dfsg1-0ubuntu7.4 libgs10 - 10.02.1~dfsg1-0ubuntu7.4 libgs10-common - 10.02.1~dfsg1-0ubuntu7.4 No subscription required
Medium
CVE-2024-46951
CVE-2024-46952
CVE-2024-46953
CVE-2024-46954
CVE-2024-46955
CVE-2024-46956
USN-7104-1 -- curl vulnerability
Ubuntu 24.04 LTS
It was discovered that curl could overwrite the HSTS expiry of the parent domain with the subdomain's HSTS entry. This could lead to curl switching back to insecure HTTP earlier than otherwise intended, resulting in information exposure. Update Instructions: Run `sudo pro fix USN-7104-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.5 libcurl3t64-gnutls - 8.5.0-2ubuntu10.5 libcurl4-doc - 8.5.0-2ubuntu10.5 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.5 libcurl4-openssl-dev - 8.5.0-2ubuntu10.5 libcurl4t64 - 8.5.0-2ubuntu10.5 No subscription required
Low
CVE-2024-9681
USN-7108-1 -- AsyncSSH vulnerabilities
Ubuntu 24.04 LTS
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH did not properly handle the extension info message. An attacker able to intercept communications could possibly use this issue to downgrade the algorithm used for client authentication. (CVE-2023-46445) Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH did not properly handle the user authentication request message. An attacker could possibly use this issue to control the remote end of an SSH client session via packet injection/removal and shell emulation. (CVE-2023-46446) Update Instructions: Run `sudo pro fix USN-7108-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-asyncssh-doc - 2.10.1-2ubuntu0.1+esm1 python3-asyncssh - 2.10.1-2ubuntu0.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-46445
CVE-2023-46446
USN-7113-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7113-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.3-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-44244
CVE-2024-44296
USN-7114-1 -- GLib vulnerability
Ubuntu 24.04 LTS
It was discovered that Glib incorrectly handled certain trailing characters. An attacker could possibly use this issue to cause a crash or other undefined behavior. Update Instructions: Run `sudo pro fix USN-7114-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.2 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.2 gir1.2-glib-2.0 - 2.80.0-6ubuntu3.2 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.2 libgirepository-2.0-0 - 2.80.0-6ubuntu3.2 libgirepository-2.0-dev - 2.80.0-6ubuntu3.2 libglib2.0-0t64 - 2.80.0-6ubuntu3.2 libglib2.0-bin - 2.80.0-6ubuntu3.2 libglib2.0-data - 2.80.0-6ubuntu3.2 libglib2.0-dev - 2.80.0-6ubuntu3.2 libglib2.0-dev-bin - 2.80.0-6ubuntu3.2 libglib2.0-doc - 2.80.0-6ubuntu3.2 libglib2.0-tests - 2.80.0-6ubuntu3.2 No subscription required
Medium
CVE-2024-52533
USN-7115-1 -- Waitress vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Waitress could process follow up requests when receiving a specially crafted message. An attacker could use this issue to have the server process inconsistent client requests. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-49768) Dylan Jay discovered that Waitress could be lead to write to an unexisting socket after closing the remote connection. An attacker could use this issue to increase resource utilization leading to a denial of service. (CVE-2024-49769) Update Instructions: Run `sudo pro fix USN-7115-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-waitress-doc - 2.1.2-2ubuntu0.1~esm1 python3-waitress - 2.1.2-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-49768
CVE-2024-49769
USN-7116-1 -- Python vulnerability
Ubuntu 24.04 LTS
It was discovered that Python incorrectly handled quoting path names when using the venv module. A local attacker able to control virtual environments could possibly use this issue to execute arbitrary code when the virtual environment is activated. Update Instructions: Run `sudo pro fix USN-7116-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.3 libpython3.12-dev - 3.12.3-1ubuntu0.3 libpython3.12-minimal - 3.12.3-1ubuntu0.3 libpython3.12-stdlib - 3.12.3-1ubuntu0.3 libpython3.12-testsuite - 3.12.3-1ubuntu0.3 libpython3.12t64 - 3.12.3-1ubuntu0.3 python3.12 - 3.12.3-1ubuntu0.3 python3.12-dev - 3.12.3-1ubuntu0.3 python3.12-doc - 3.12.3-1ubuntu0.3 python3.12-examples - 3.12.3-1ubuntu0.3 python3.12-full - 3.12.3-1ubuntu0.3 python3.12-minimal - 3.12.3-1ubuntu0.3 python3.12-nopie - 3.12.3-1ubuntu0.3 python3.12-venv - 3.12.3-1ubuntu0.3 No subscription required
Medium
CVE-2024-9287
USN-7117-1 -- needrestart and Module::ScanDeps vulnerabilities
Ubuntu 24.04 LTS
Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmodule-scandeps-perl - 1.35-1ubuntu0.24.04.1 No subscription required needrestart - 3.6-7ubuntu4.3 No subscription required
High
CVE-2024-10224
CVE-2024-11003
CVE-2024-48990
CVE-2024-48991
CVE-2024-48992
USN-7117-2 -- needrestart regression
Ubuntu 24.04 LTS
USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a regression in needrestart. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: needrestart - 3.6-7ubuntu4.4 No subscription required
None
https://launchpad.net/bugs/2089193
USN-7117-3 -- needrestart regression
Ubuntu 24.04 LTS
USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a regression in needrestart. This update fixes the problem for LXC containers. We apologize for the inconvenience. Original advisory details: Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: needrestart - 3.6-7ubuntu4.5 No subscription required
None
https://launchpad.net/bugs/2091096
USN-7120-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1014-gke - 6.8.0-1014.18 linux-gke - 6.8.0-1014.18 linux-gke-headers-6.8.0-1014 - 6.8.0-1014.18 linux-gke-tools-6.8.0-1014 - 6.8.0-1014.18 linux-headers-6.8.0-1014-gke - 6.8.0-1014.18 linux-headers-gke - 6.8.0-1014.18 linux-image-6.8.0-1014-gke - 6.8.0-1014.18 linux-image-gke - 6.8.0-1014.18 linux-image-unsigned-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-extra-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-iwlwifi-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-iwlwifi-gke - 6.8.0-1014.18 linux-tools-6.8.0-1014-gke - 6.8.0-1014.18 linux-tools-gke - 6.8.0-1014.18 No subscription required linux-buildinfo-6.8.0-1015-raspi - 6.8.0-1015.17 linux-headers-6.8.0-1015-raspi - 6.8.0-1015.17 linux-headers-raspi - 6.8.0-1015.17 linux-image-6.8.0-1015-raspi - 6.8.0-1015.17 linux-image-raspi - 6.8.0-1015.17 linux-modules-6.8.0-1015-raspi - 6.8.0-1015.17 linux-raspi - 6.8.0-1015.17 linux-raspi-headers-6.8.0-1015 - 6.8.0-1015.17 linux-raspi-tools-6.8.0-1015 - 6.8.0-1015.17 linux-tools-6.8.0-1015-raspi - 6.8.0-1015.17 linux-tools-raspi - 6.8.0-1015.17 No subscription required linux-buildinfo-6.8.0-1016-ibm - 6.8.0-1016.16 linux-headers-6.8.0-1016-ibm - 6.8.0-1016.16 linux-headers-ibm - 6.8.0-1016.16 linux-headers-ibm-classic - 6.8.0-1016.16 linux-headers-ibm-lts-24.04 - 6.8.0-1016.16 linux-ibm - 6.8.0-1016.16 linux-ibm-classic - 6.8.0-1016.16 linux-ibm-cloud-tools-common - 6.8.0-1016.16 linux-ibm-headers-6.8.0-1016 - 6.8.0-1016.16 linux-ibm-lts-24.04 - 6.8.0-1016.16 linux-ibm-source-6.8.0 - 6.8.0-1016.16 linux-ibm-tools-6.8.0-1016 - 6.8.0-1016.16 linux-image-6.8.0-1016-ibm - 6.8.0-1016.16 linux-image-ibm - 6.8.0-1016.16 linux-image-ibm-classic - 6.8.0-1016.16 linux-image-ibm-lts-24.04 - 6.8.0-1016.16 linux-image-unsigned-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-extra-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-ibm-classic - 6.8.0-1016.16 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1016.16 linux-tools-6.8.0-1016-ibm - 6.8.0-1016.16 linux-tools-ibm - 6.8.0-1016.16 linux-tools-ibm-classic - 6.8.0-1016.16 linux-tools-ibm-lts-24.04 - 6.8.0-1016.16 No subscription required linux-buildinfo-6.8.0-1016-oracle - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-headers-6.8.0-1016-oracle - 6.8.0-1016.17 linux-headers-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-headers-oracle - 6.8.0-1016.17 linux-headers-oracle-64k - 6.8.0-1016.17 linux-image-6.8.0-1016-oracle - 6.8.0-1016.17 linux-image-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-image-oracle - 6.8.0-1016.17 linux-image-oracle-64k - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-oracle - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-modules-6.8.0-1016-oracle - 6.8.0-1016.17 linux-modules-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-oracle - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-oracle - 6.8.0-1016.17 linux-oracle-64k - 6.8.0-1016.17 linux-oracle-headers-6.8.0-1016 - 6.8.0-1016.17 linux-oracle-tools-6.8.0-1016 - 6.8.0-1016.17 linux-tools-6.8.0-1016-oracle - 6.8.0-1016.17 linux-tools-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-tools-oracle - 6.8.0-1016.17 linux-tools-oracle-64k - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-1017-oem - 6.8.0-1017.17 linux-headers-6.8.0-1017-oem - 6.8.0-1017.17 linux-headers-oem-24.04 - 6.8.0-1017.17 linux-headers-oem-24.04a - 6.8.0-1017.17 linux-image-6.8.0-1017-oem - 6.8.0-1017.17 linux-image-oem-24.04 - 6.8.0-1017.17 linux-image-oem-24.04a - 6.8.0-1017.17 linux-image-uc-6.8.0-1017-oem - 6.8.0-1017.17 linux-image-uc-oem-24.04 - 6.8.0-1017.17 linux-image-uc-oem-24.04a - 6.8.0-1017.17 linux-image-unsigned-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-ipu6-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-ipu6-oem-24.04 - 6.8.0-1017.17 linux-modules-ipu6-oem-24.04a - 6.8.0-1017.17 linux-modules-iwlwifi-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1017.17 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1017.17 linux-modules-usbio-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-usbio-oem-24.04 - 6.8.0-1017.17 linux-modules-usbio-oem-24.04a - 6.8.0-1017.17 linux-oem-24.04 - 6.8.0-1017.17 linux-oem-24.04a - 6.8.0-1017.17 linux-oem-6.8-headers-6.8.0-1017 - 6.8.0-1017.17 linux-oem-6.8-tools-6.8.0-1017 - 6.8.0-1017.17 linux-tools-6.8.0-1017-oem - 6.8.0-1017.17 linux-tools-oem-24.04 - 6.8.0-1017.17 linux-tools-oem-24.04a - 6.8.0-1017.17 No subscription required linux-buildinfo-6.8.0-1018-gcp - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-cloud-tools-nvidia - 6.8.0-1018.20 linux-gcp - 6.8.0-1018.20 linux-gcp-headers-6.8.0-1018 - 6.8.0-1018.20 linux-gcp-tools-6.8.0-1018 - 6.8.0-1018.20 linux-headers-6.8.0-1018-gcp - 6.8.0-1018.20 linux-headers-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-headers-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-headers-gcp - 6.8.0-1018.20 linux-headers-nvidia - 6.8.0-1018.20 linux-headers-nvidia-64k - 6.8.0-1018.20 linux-image-6.8.0-1018-gcp - 6.8.0-1018.20 linux-image-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-image-gcp - 6.8.0-1018.20 linux-image-nvidia - 6.8.0-1018.20 linux-image-nvidia-64k - 6.8.0-1018.20 linux-image-uc-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-uc-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-gcp - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-6.8.0-1018-gcp - 6.8.0-1018.20 linux-modules-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-gcp - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-extra-gcp - 6.8.0-1018.20 linux-modules-nvidia-fs-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-nvidia-fs-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-nvidia-fs-nvidia - 6.8.0-1018.20 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1018.20 linux-nvidia - 6.8.0-1018.20 linux-nvidia-64k - 6.8.0-1018.20 linux-nvidia-headers-6.8.0-1018 - 6.8.0-1018.20 linux-nvidia-tools-6.8.0-1018 - 6.8.0-1018.20 linux-tools-6.8.0-1018-gcp - 6.8.0-1018.20 linux-tools-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-tools-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-tools-gcp - 6.8.0-1018.20 linux-tools-nvidia - 6.8.0-1018.20 linux-tools-nvidia-64k - 6.8.0-1018.20 No subscription required linux-buildinfo-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-buildinfo-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-headers-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-uc-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-uc-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-unsigned-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-unsigned-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-extra-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-nvidia-lowlatency - 6.8.0-1018.20.1 linux-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-nvidia-lowlatency-headers-6.8.0-1018 - 6.8.0-1018.20.1 linux-nvidia-lowlatency-tools-6.8.0-1018 - 6.8.0-1018.20.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1018.20.1 linux-tools-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-tools-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-tools-nvidia-lowlatency - 6.8.0-1018.20.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1018.20.1 No subscription required linux-aws - 6.8.0-1019.21 linux-aws-cloud-tools-6.8.0-1019 - 6.8.0-1019.21 linux-aws-headers-6.8.0-1019 - 6.8.0-1019.21 linux-aws-tools-6.8.0-1019 - 6.8.0-1019.21 linux-buildinfo-6.8.0-1019-aws - 6.8.0-1019.21 linux-cloud-tools-6.8.0-1019-aws - 6.8.0-1019.21 linux-headers-6.8.0-1019-aws - 6.8.0-1019.21 linux-headers-aws - 6.8.0-1019.21 linux-image-6.8.0-1019-aws - 6.8.0-1019.21 linux-image-aws - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-extra-aws - 6.8.0-1019.21 linux-tools-6.8.0-1019-aws - 6.8.0-1019.21 linux-tools-aws - 6.8.0-1019.21 No subscription required linux-buildinfo-6.8.0-49-generic - 6.8.0-49.49 linux-buildinfo-6.8.0-49-generic-64k - 6.8.0-49.49 linux-cloud-tools-6.8.0-49 - 6.8.0-49.49 linux-cloud-tools-6.8.0-49-generic - 6.8.0-49.49 linux-cloud-tools-common - 6.8.0-49.49 linux-cloud-tools-generic - 6.8.0-49.49 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-49.49 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-49.49 linux-cloud-tools-virtual - 6.8.0-49.49 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-49.49 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-crashdump - 6.8.0-49.49 linux-doc - 6.8.0-49.49 linux-generic - 6.8.0-49.49 linux-generic-64k - 6.8.0-49.49 linux-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-generic-hwe-24.04 - 6.8.0-49.49 linux-generic-hwe-24.04-edge - 6.8.0-49.49 linux-generic-lpae - 6.8.0-49.49 linux-headers-6.8.0-49 - 6.8.0-49.49 linux-headers-6.8.0-49-generic - 6.8.0-49.49 linux-headers-6.8.0-49-generic-64k - 6.8.0-49.49 linux-headers-generic - 6.8.0-49.49 linux-headers-generic-64k - 6.8.0-49.49 linux-headers-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-headers-generic-hwe-24.04 - 6.8.0-49.49 linux-headers-generic-hwe-24.04-edge - 6.8.0-49.49 linux-headers-generic-lpae - 6.8.0-49.49 linux-headers-kvm - 6.8.0-49.49 linux-headers-laptop-23.10 - 6.8.0-49.49 linux-headers-oem-20.04 - 6.8.0-49.49 linux-headers-oem-20.04b - 6.8.0-49.49 linux-headers-oem-20.04c - 6.8.0-49.49 linux-headers-oem-20.04d - 6.8.0-49.49 linux-headers-oem-22.04 - 6.8.0-49.49 linux-headers-virtual - 6.8.0-49.49 linux-headers-virtual-hwe-24.04 - 6.8.0-49.49 linux-headers-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-image-6.8.0-49-generic - 6.8.0-49.49 linux-image-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-extra-virtual - 6.8.0-49.49 linux-image-extra-virtual-hwe-24.04 - 6.8.0-49.49 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic - 6.8.0-49.49 linux-image-generic-64k - 6.8.0-49.49 linux-image-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic-hwe-24.04 - 6.8.0-49.49 linux-image-generic-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic-lpae - 6.8.0-49.49 linux-image-kvm - 6.8.0-49.49 linux-image-laptop-23.10 - 6.8.0-49.49 linux-image-oem-20.04 - 6.8.0-49.49 linux-image-oem-20.04b - 6.8.0-49.49 linux-image-oem-20.04c - 6.8.0-49.49 linux-image-oem-20.04d - 6.8.0-49.49 linux-image-oem-22.04 - 6.8.0-49.49 linux-image-uc-6.8.0-49-generic - 6.8.0-49.49 linux-image-uc-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-uc-generic - 6.8.0-49.49 linux-image-uc-generic-hwe-24.04 - 6.8.0-49.49 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-49.49 linux-image-unsigned-6.8.0-49-generic - 6.8.0-49.49 linux-image-unsigned-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-virtual - 6.8.0-49.49 linux-image-virtual-hwe-24.04 - 6.8.0-49.49 linux-image-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-kvm - 6.8.0-49.49 linux-laptop-23.10 - 6.8.0-49.49 linux-lib-rust-6.8.0-49-generic - 6.8.0-49.49 linux-libc-dev - 6.8.0-49.49 linux-modules-6.8.0-49-generic - 6.8.0-49.49 linux-modules-6.8.0-49-generic-64k - 6.8.0-49.49 linux-modules-extra-6.8.0-49-generic - 6.8.0-49.49 linux-modules-ipu6-6.8.0-49-generic - 6.8.0-49.49 linux-modules-ipu6-generic - 6.8.0-49.49 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-49.49 linux-modules-iwlwifi-6.8.0-49-generic - 6.8.0-49.49 linux-modules-iwlwifi-generic - 6.8.0-49.49 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-49.49 linux-modules-iwlwifi-oem-20.04 - 6.8.0-49.49 linux-modules-iwlwifi-oem-20.04d - 6.8.0-49.49 linux-modules-iwlwifi-oem-22.04 - 6.8.0-49.49 linux-modules-usbio-6.8.0-49-generic - 6.8.0-49.49 linux-modules-usbio-generic - 6.8.0-49.49 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-49.49 linux-oem-20.04 - 6.8.0-49.49 linux-oem-20.04b - 6.8.0-49.49 linux-oem-20.04c - 6.8.0-49.49 linux-oem-20.04d - 6.8.0-49.49 linux-oem-22.04 - 6.8.0-49.49 linux-source - 6.8.0-49.49 linux-source-6.8.0 - 6.8.0-49.49 linux-tools-6.8.0-49 - 6.8.0-49.49 linux-tools-6.8.0-49-generic - 6.8.0-49.49 linux-tools-6.8.0-49-generic-64k - 6.8.0-49.49 linux-tools-common - 6.8.0-49.49 linux-tools-generic - 6.8.0-49.49 linux-tools-generic-64k - 6.8.0-49.49 linux-tools-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-tools-generic-hwe-24.04 - 6.8.0-49.49 linux-tools-generic-hwe-24.04-edge - 6.8.0-49.49 linux-tools-generic-lpae - 6.8.0-49.49 linux-tools-host - 6.8.0-49.49 linux-tools-kvm - 6.8.0-49.49 linux-tools-laptop-23.10 - 6.8.0-49.49 linux-tools-oem-20.04 - 6.8.0-49.49 linux-tools-oem-20.04b - 6.8.0-49.49 linux-tools-oem-20.04c - 6.8.0-49.49 linux-tools-oem-20.04d - 6.8.0-49.49 linux-tools-oem-22.04 - 6.8.0-49.49 linux-tools-virtual - 6.8.0-49.49 linux-tools-virtual-hwe-24.04 - 6.8.0-49.49 linux-tools-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-virtual - 6.8.0-49.49 linux-virtual-hwe-24.04 - 6.8.0-49.49 linux-virtual-hwe-24.04-edge - 6.8.0-49.49 No subscription required
High
CVE-2024-43882
CVE-2024-46800
USN-7120-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1018.21 linux-azure-cloud-tools-6.8.0-1018 - 6.8.0-1018.21 linux-azure-fde - 6.8.0-1018.21 linux-azure-headers-6.8.0-1018 - 6.8.0-1018.21 linux-azure-tools-6.8.0-1018 - 6.8.0-1018.21 linux-buildinfo-6.8.0-1018-azure - 6.8.0-1018.21 linux-cloud-tools-6.8.0-1018-azure - 6.8.0-1018.21 linux-cloud-tools-azure - 6.8.0-1018.21 linux-headers-6.8.0-1018-azure - 6.8.0-1018.21 linux-headers-azure - 6.8.0-1018.21 linux-image-6.8.0-1018-azure - 6.8.0-1018.21 linux-image-6.8.0-1018-azure-fde - 6.8.0-1018.21 linux-image-azure - 6.8.0-1018.21 linux-image-azure-fde - 6.8.0-1018.21 linux-image-unsigned-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-extra-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-extra-azure - 6.8.0-1018.21 linux-modules-involflt-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-involflt-azure - 6.8.0-1018.21 linux-modules-iwlwifi-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-iwlwifi-azure - 6.8.0-1018.21 linux-tools-6.8.0-1018-azure - 6.8.0-1018.21 linux-tools-azure - 6.8.0-1018.21 No subscription required
High
CVE-2024-43882
CVE-2024-46800
USN-7120-3 -- Linux kernel (Low Latency) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-buildinfo-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-cloud-tools-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-cloud-tools-lowlatency - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-headers-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-headers-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-headers-lowlatency - 6.8.0-49.49.1 linux-headers-lowlatency-64k - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-image-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-image-lowlatency - 6.8.0-49.49.1 linux-image-lowlatency-64k - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-unsigned-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-image-unsigned-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-lowlatency - 6.8.0-49.49.1 linux-lowlatency-64k - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-lowlatency-cloud-tools-6.8.0-49 - 6.8.0-49.49.1 linux-lowlatency-headers-6.8.0-49 - 6.8.0-49.49.1 linux-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-lowlatency-lib-rust-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-lowlatency-tools-6.8.0-49 - 6.8.0-49.49.1 linux-modules-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-modules-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-modules-iwlwifi-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-tools-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-tools-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-tools-lowlatency - 6.8.0-49.49.1 linux-tools-lowlatency-64k - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 No subscription required
High
CVE-2024-43882
CVE-2024-46800
USN-7125-1 -- RapidJSON vulnerability
Ubuntu 24.04 LTS
It was discovered that RapidJSON incorrectly parsed numbers written in scientific notation, leading to an integer underflow. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7125-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rapidjson-dev - 1.1.0+dfsg2-7.2ubuntu0.1~esm1 rapidjson-doc - 1.1.0+dfsg2-7.2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-38517
USN-7126-1 -- libsoup vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libsoup ignored certain characters at the end of header names. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. (CVE-2024-52530) It was discovered that libsoup did not correctly handle memory while performing UTF-8 conversions. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-52531) It was discovered that libsoup could enter an infinite loop when reading certain websocket data. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-52532) Update Instructions: Run `sudo pro fix USN-7126-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.1 libsoup-2.4-1 - 2.74.3-6ubuntu1.1 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.1 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.1 libsoup2.4-common - 2.74.3-6ubuntu1.1 libsoup2.4-dev - 2.74.3-6ubuntu1.1 libsoup2.4-doc - 2.74.3-6ubuntu1.1 libsoup2.4-tests - 2.74.3-6ubuntu1.1 No subscription required
Medium
CVE-2024-52530
CVE-2024-52531
CVE-2024-52532
USN-7127-1 -- libsoup3 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libsoup ignored certain characters at the end of header names. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-52530) It was discovered that libsoup did not correctly handle memory while performing UTF-8 conversions. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-52531) It was discovered that libsoup could enter an infinite loop when reading certain websocket data. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-52532) Update Instructions: Run `sudo pro fix USN-7127-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-3.0 - 3.4.4-5ubuntu0.1 libsoup-3.0-0 - 3.4.4-5ubuntu0.1 libsoup-3.0-common - 3.4.4-5ubuntu0.1 libsoup-3.0-dev - 3.4.4-5ubuntu0.1 libsoup-3.0-doc - 3.4.4-5ubuntu0.1 libsoup-3.0-tests - 3.4.4-5ubuntu0.1 No subscription required
Medium
CVE-2024-52530
CVE-2024-52531
CVE-2024-52532
USN-7130-1 -- GitHub CLI vulnerability
Ubuntu 24.04 LTS
It was discovered that GitHub CLI incorrectly handled username validation. An attacker could possibly use this issue to perform remote code execution if the user connected to a malicious server. (CVE-2024-52308) Update Instructions: Run `sudo pro fix USN-7130-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gh - 2.45.0-1ubuntu0.2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-52308
USN-7131-1 -- Vim vulnerability
Ubuntu 24.04 LTS
It was discovered that Vim incorrectly handled memory when closing a buffer, leading to use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7131-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.5 vim-athena - 2:9.1.0016-1ubuntu7.5 vim-common - 2:9.1.0016-1ubuntu7.5 vim-doc - 2:9.1.0016-1ubuntu7.5 vim-gtk3 - 2:9.1.0016-1ubuntu7.5 vim-gui-common - 2:9.1.0016-1ubuntu7.5 vim-motif - 2:9.1.0016-1ubuntu7.5 vim-nox - 2:9.1.0016-1ubuntu7.5 vim-runtime - 2:9.1.0016-1ubuntu7.5 vim-tiny - 2:9.1.0016-1ubuntu7.5 xxd - 2:9.1.0016-1ubuntu7.5 No subscription required
Low
CVE-2024-47814
USN-7132-1 -- PostgreSQL vulnerabilities
Ubuntu 24.04 LTS
It was discovered that PostgreSQL incorrectly tracked tables with row security. A remote attacker could possibly use this issue to perform forbidden reads and modifications. (CVE-2024-10976) Jacob Champion discovered that PostgreSQL clients used untrusted server error messages. An attacker that is able to intercept network communications could possibly use this issue to inject error messages that could be interpreted as valid query results. (CVE-2024-10977) Tom Lane discovered that PostgreSQL incorrectly handled certain privilege assignments. A remote attacker could possibly use this issue to view or change different rows from those intended. (CVE-2024-10978) Coby Abrams discovered that PostgreSQL incorrectly handled environment variables. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-10979) Update Instructions: Run `sudo pro fix USN-7132-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.6-0ubuntu0.24.04.1 libecpg-dev - 16.6-0ubuntu0.24.04.1 libecpg6 - 16.6-0ubuntu0.24.04.1 libpgtypes3 - 16.6-0ubuntu0.24.04.1 libpq-dev - 16.6-0ubuntu0.24.04.1 libpq5 - 16.6-0ubuntu0.24.04.1 postgresql-16 - 16.6-0ubuntu0.24.04.1 postgresql-client-16 - 16.6-0ubuntu0.24.04.1 postgresql-doc-16 - 16.6-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.6-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.6-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.6-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.6-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-10976
CVE-2024-10977
CVE-2024-10978
CVE-2024-10979
USN-7133-1 -- HAProxy vulnerability
Ubuntu 24.04 LTS
Yuki Mogi discovered that HAProxy incorrectly handled the interpretation of certain HTTP requests. A remote attacker could possibly use this issue to perform a request smuggling attack and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7133-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: haproxy - 2.8.5-1ubuntu3.2 haproxy-doc - 2.8.5-1ubuntu3.2 vim-haproxy - 2.8.5-1ubuntu3.2 No subscription required
Medium
CVE-2024-53008
USN-7136-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
jiangniao discovered that Django incorrectly handled the API to strip tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. (CVE-2024-53907) Seokchan Yoon discovered that Django incorrectly handled HasKey lookups when using Oracle. A remote attacker could possibly use this issue to inject arbitrary SQL code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-53908) Update Instructions: Run `sudo pro fix USN-7136-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.4 python3-django - 3:4.2.11-1ubuntu1.4 No subscription required
Medium
CVE-2024-53907
CVE-2024-53908
USN-7141-1 -- oFono vulnerabilities
Ubuntu 24.04 LTS
It was discovered that oFono incorrectly handled decoding SMS messages leading to a stack overflow. A remote attacker could potentially use this issue to cause a denial of service. (CVE-2023-2794, CVE-2023-4233, CVE-2023-4234) Update Instructions: Run `sudo pro fix USN-7141-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ofono - 1.31-3ubuntu3.24.04.1 ofono-dev - 1.31-3ubuntu3.24.04.1 ofono-scripts - 1.31-3ubuntu3.24.04.1 No subscription required
Medium
CVE-2023-2794
CVE-2023-4233
CVE-2023-4234
USN-7142-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7142-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.4-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.4-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.4-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.4-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.4-0ubuntu0.24.04.1 No subscription required
High
CVE-2024-44308
CVE-2024-44309
USN-7145-1 -- Expat vulnerability
Ubuntu 24.04 LTS
It was discovered that Expat did not properly handle its internal state when attempting to resume an unstarted parser. An attacker could use this issue to cause a denial of service (application crash). Update Instructions: Run `sudo pro fix USN-7145-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.2 libexpat1 - 2.6.1-2ubuntu0.2 libexpat1-dev - 2.6.1-2ubuntu0.2 No subscription required
Medium
CVE-2024-50602
USN-7147-1 -- Apache Shiro vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Apache Shiro incorrectly handled path traversal when used with other web frameworks or path rewriting. An attacker could possibly use this issue to obtain sensitive information or administrative privileges. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-34478, CVE-2023-46749) It was discovered that Apache Shiro incorrectly handled web redirects when used together with the form authentication method. An attacker could possibly use this issue to perform phishing attacks. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-46750) It was discovered that Apache Shiro incorrectly handled requests through servlet filtering. An attacker could possibly use this issue to obtain administrative privileges. This update provides the corresponding fix for Ubuntu 16.04 LTS. (CVE-2016-6802) Update Instructions: Run `sudo pro fix USN-7147-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libshiro-java - 1.3.2-5ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2016-6802
CVE-2023-34478
CVE-2023-46749
CVE-2023-46750
USN-7149-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
Avraham Shalev and Nagaraju N Kodalapura discovered that some Intel(R) Xeon(R) processors did not properly restrict access to the memory controller when using Intel(R) SGX. This may allow a local privileged attacker to further escalate their privileges. (CVE-2024-21820, CVE-2024-23918) It was discovered that some 4th and 5th Generation Intel(R) Xeon(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. THis may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-21853) It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7149-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20241112.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-21820
CVE-2024-21853
CVE-2024-23918
CVE-2024-23984
CVE-2024-24968
USN-7150-1 -- Tornado vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Tornado incorrectly handled a certain redirect. A remote attacker could possibly use this issue to redirect a user to an arbitrary web site and conduct a phishing attack by having the user access a specially crafted URL. This issue was only addressed in Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. Ubuntu 16.04 LTS was previously addressed in USN-6159-1. (CVE-2023-28370) It was discovered that Tornado inefficiently handled requests when parsing cookies. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. (CVE-2024-52804) Update Instructions: Run `sudo pro fix USN-7150-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-tornado-doc - 6.4.0-1ubuntu0.1 python3-tornado - 6.4.0-1ubuntu0.1 No subscription required
Medium
CVE-2023-28370
CVE-2024-52804
USN-7151-1 -- oFono vulnerabilities
Ubuntu 24.04 LTS
It was discovered that oFono incorrectly handled decoding SMS messages leading to a stack overflow. A remote attacker could potentially use this issue to cause a denial of service. (CVE-2023-4232, CVE-2023-4235) Update Instructions: Run `sudo pro fix USN-7151-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ofono - 1.31-3ubuntu3.24.04.2 ofono-dev - 1.31-3ubuntu3.24.04.2 ofono-scripts - 1.31-3ubuntu3.24.04.2 No subscription required
Medium
CVE-2023-4232
CVE-2023-4235
USN-7154-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-46783, CVE-2024-44960, CVE-2024-46743, CVE-2024-45009, CVE-2024-43820, CVE-2024-43888, CVE-2024-45010, CVE-2024-43839, CVE-2024-42304, CVE-2024-43846, CVE-2024-42258, CVE-2024-45005, CVE-2024-46709, CVE-2024-46774, CVE-2024-43883, CVE-2024-43859, CVE-2024-46721, CVE-2024-44944, CVE-2024-43913, CVE-2024-43843, CVE-2024-43845, CVE-2024-45018, CVE-2024-43909, CVE-2024-46755, CVE-2024-42284, CVE-2024-42301, CVE-2024-46779, CVE-2024-44971, CVE-2024-46711, CVE-2024-43889, CVE-2024-46842, CVE-2024-44978, CVE-2024-46803, CVE-2024-42277, CVE-2024-43892, CVE-2024-45019, CVE-2024-44988, CVE-2024-46798, CVE-2024-44995, CVE-2024-43860, CVE-2024-46762, CVE-2024-43831, CVE-2024-44990, CVE-2024-46845, CVE-2024-46765, CVE-2024-45012, CVE-2024-44975, CVE-2024-46770, CVE-2024-46802, CVE-2024-44970, CVE-2024-46691, CVE-2024-43833, CVE-2024-43876, CVE-2024-42292, CVE-2024-42291, CVE-2024-43891, CVE-2024-46788, CVE-2024-44938, CVE-2024-46710, CVE-2024-42272, CVE-2024-43868, CVE-2024-43875, CVE-2024-45030, CVE-2024-46689, CVE-2024-46859, CVE-2024-46795, CVE-2024-46683, CVE-2024-44999, CVE-2024-44942, CVE-2024-47669, CVE-2024-42318, CVE-2024-43911, CVE-2024-46693, CVE-2024-42296, CVE-2024-43894, CVE-2024-45002, CVE-2024-46673, CVE-2024-46852, CVE-2024-45001, CVE-2024-43907, CVE-2024-42319, CVE-2024-44972, CVE-2024-43905, CVE-2024-45028, CVE-2024-46816, CVE-2024-46847, CVE-2024-46834, CVE-2024-44982, CVE-2024-46807, CVE-2024-44948, CVE-2024-46685, CVE-2024-46811, CVE-2024-42317, CVE-2024-43818, CVE-2024-46786, CVE-2024-43881, CVE-2024-42294, CVE-2024-46708, CVE-2024-42285, CVE-2024-44941, CVE-2024-43823, CVE-2024-46694, CVE-2024-46730, CVE-2024-42259, CVE-2024-42270, CVE-2024-47658, CVE-2024-46718, CVE-2024-44947, CVE-2024-46701, CVE-2024-43895, CVE-2024-43890, CVE-2024-46826, CVE-2024-46687, CVE-2024-46768, CVE-2024-45025, CVE-2024-42267, CVE-2024-42263, CVE-2024-44958, CVE-2024-44989, CVE-2024-43906, CVE-2024-43869, CVE-2024-43887, CVE-2024-42297, CVE-2024-46702, CVE-2024-42320, CVE-2024-42322, CVE-2024-46857, CVE-2024-43861, CVE-2024-45008, CVE-2024-44969, CVE-2024-46821, CVE-2024-44967, CVE-2024-43914, CVE-2024-46870, CVE-2024-46781, CVE-2024-43842, CVE-2024-47665, CVE-2024-46753, CVE-2024-43866, CVE-2024-43886, CVE-2024-44939, CVE-2024-42312, CVE-2024-46864, CVE-2024-46695, CVE-2024-46818, CVE-2024-45006, CVE-2024-43841, CVE-2024-46703, CVE-2024-46749, CVE-2024-44986, CVE-2024-46717, CVE-2024-42273, CVE-2024-43856, CVE-2024-46777, CVE-2024-44984, CVE-2024-46719, CVE-2024-46858, CVE-2024-43821, CVE-2024-46750, CVE-2024-43829, CVE-2024-43817, CVE-2024-42281, CVE-2024-42287, CVE-2024-45007, CVE-2024-46793, CVE-2024-45003, CVE-2024-45011, CVE-2024-47683, CVE-2024-44934, CVE-2024-46722, CVE-2024-46860, CVE-2024-42314, CVE-2024-46675, CVE-2024-43899, CVE-2024-46752, CVE-2024-46851, CVE-2024-42310, CVE-2024-46853, CVE-2024-39472, CVE-2024-43837, CVE-2024-45021, CVE-2024-46713, CVE-2024-44943, CVE-2024-46787, CVE-2024-43893, CVE-2024-44946, CVE-2024-45026, CVE-2024-44996, CVE-2024-46761, CVE-2024-46723, CVE-2024-42311, CVE-2024-42316, CVE-2024-47663, CVE-2024-44940, CVE-2024-43867, CVE-2024-42265, CVE-2024-44950, CVE-2024-46867, CVE-2024-45020, CVE-2024-46707, CVE-2024-44966, CVE-2024-42309, CVE-2024-46767, CVE-2024-46758, CVE-2024-46732, CVE-2024-42262, CVE-2024-46778, CVE-2024-43884, CVE-2024-44991, CVE-2024-47668, CVE-2024-46698, CVE-2024-46825, CVE-2024-42302, CVE-2024-46716, CVE-2024-46726, CVE-2024-43870, CVE-2024-42307, CVE-2024-46830, CVE-2024-43910, CVE-2024-46735, CVE-2024-43828, CVE-2024-43904, CVE-2024-44965, CVE-2024-46831, CVE-2024-44979, CVE-2024-44961, CVE-2024-46771, CVE-2024-46844, CVE-2024-46871, CVE-2024-43877, CVE-2024-46746, CVE-2024-44987, CVE-2024-46676, CVE-2024-46766, CVE-2024-46731, CVE-2024-46810, CVE-2024-46806, CVE-2024-45000, CVE-2024-42313, CVE-2024-45015, CVE-2024-46784, CVE-2024-43834, CVE-2024-46737, CVE-2024-46797, CVE-2024-43908, CVE-2024-46724, CVE-2024-44980, CVE-2024-43847, CVE-2024-46679, CVE-2024-46681, CVE-2024-43819, CVE-2024-46776, CVE-2024-44954, CVE-2024-45022, CVE-2024-46819, CVE-2024-46775, CVE-2024-43824, CVE-2024-44953, CVE-2024-46759, CVE-2024-43873, CVE-2024-46756, CVE-2024-42303, CVE-2024-46738, CVE-2024-42290, CVE-2024-42295, CVE-2024-43849, CVE-2024-44931, CVE-2024-46741, CVE-2024-43863, CVE-2024-44974, CVE-2024-46829, CVE-2024-44959, CVE-2024-42315, CVE-2024-44983, CVE-2024-46715, CVE-2024-46697, CVE-2024-43850, CVE-2024-46728, CVE-2024-44963, CVE-2024-46823, CVE-2024-46692, CVE-2024-46760, CVE-2024-46705, CVE-2024-42261, CVE-2024-42321, CVE-2024-46785, CVE-2024-46686, CVE-2024-49984, CVE-2024-46706, CVE-2024-45029, CVE-2024-46809, CVE-2024-43827, CVE-2024-44998, CVE-2024-47667, CVE-2024-43835, CVE-2024-46866, CVE-2024-46841, CVE-2024-42286, CVE-2024-43852, CVE-2024-43832, CVE-2024-46773, CVE-2024-46817, CVE-2024-46868, CVE-2024-46812, CVE-2024-47660, CVE-2024-46725, CVE-2024-42288, CVE-2024-46824, CVE-2024-42269, CVE-2024-44957, CVE-2024-45017, CVE-2024-46747, CVE-2024-47662, CVE-2024-46843, CVE-2024-46849, CVE-2024-43879, CVE-2024-46751, CVE-2024-42298, CVE-2024-46861, CVE-2024-44993, CVE-2024-46729, CVE-2024-46846, CVE-2024-46794, CVE-2024-43826, CVE-2024-44973, CVE-2024-46672, CVE-2024-44985, CVE-2024-46815, CVE-2024-46822, CVE-2024-46754, CVE-2024-43854, CVE-2024-42278, CVE-2024-46720, CVE-2024-46677, CVE-2024-46854, CVE-2024-43840, CVE-2024-43830, CVE-2024-46804, CVE-2024-45013, CVE-2024-46782, CVE-2024-46840, CVE-2024-44977, CVE-2024-46838, CVE-2024-42264, CVE-2024-47661, CVE-2024-43857, CVE-2023-52918, CVE-2024-44935, CVE-2024-46739, CVE-2024-43825, CVE-2024-43864, CVE-2024-47659, CVE-2024-42260, CVE-2024-44962, CVE-2024-46835, CVE-2024-43871, CVE-2024-47674, CVE-2024-46827, CVE-2024-42283, CVE-2024-42299, CVE-2024-46714, CVE-2024-46740, CVE-2024-46680, CVE-2024-46791, CVE-2024-43912, CVE-2024-46813, CVE-2024-46733, CVE-2024-47664, CVE-2024-42279, CVE-2024-46850, CVE-2024-42289, CVE-2024-46808, CVE-2024-43880, CVE-2024-46832, CVE-2024-42276, CVE-2024-44937, CVE-2024-42274, CVE-2024-46772, CVE-2024-47666, CVE-2024-44956, CVE-2024-46763, CVE-2024-46805, CVE-2023-52889, CVE-2024-46678, CVE-2024-43902, CVE-2024-46757, CVE-2024-46792, CVE-2024-42268, CVE-2024-43853, CVE-2024-45027, CVE-2024-42305, CVE-2024-46828, CVE-2024-43900, CVE-2024-46848, CVE-2024-46814, CVE-2024-46855, CVE-2024-46727, CVE-2024-46836, CVE-2024-46744, CVE-2024-46780, CVE-2024-46745, CVE-2024-42306) Update Instructions: Run `sudo pro fix USN-7154-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1015-gke - 6.8.0-1015.19 linux-gke - 6.8.0-1015.19 linux-gke-headers-6.8.0-1015 - 6.8.0-1015.19 linux-gke-tools-6.8.0-1015 - 6.8.0-1015.19 linux-headers-6.8.0-1015-gke - 6.8.0-1015.19 linux-headers-gke - 6.8.0-1015.19 linux-image-6.8.0-1015-gke - 6.8.0-1015.19 linux-image-gke - 6.8.0-1015.19 linux-image-unsigned-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-extra-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-iwlwifi-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-iwlwifi-gke - 6.8.0-1015.19 linux-tools-6.8.0-1015-gke - 6.8.0-1015.19 linux-tools-gke - 6.8.0-1015.19 No subscription required linux-buildinfo-6.8.0-1016-raspi - 6.8.0-1016.18 linux-headers-6.8.0-1016-raspi - 6.8.0-1016.18 linux-headers-raspi - 6.8.0-1016.18 linux-image-6.8.0-1016-raspi - 6.8.0-1016.18 linux-image-raspi - 6.8.0-1016.18 linux-modules-6.8.0-1016-raspi - 6.8.0-1016.18 linux-raspi - 6.8.0-1016.18 linux-raspi-headers-6.8.0-1016 - 6.8.0-1016.18 linux-raspi-tools-6.8.0-1016 - 6.8.0-1016.18 linux-tools-6.8.0-1016-raspi - 6.8.0-1016.18 linux-tools-raspi - 6.8.0-1016.18 No subscription required linux-buildinfo-6.8.0-1017-ibm - 6.8.0-1017.17 linux-headers-6.8.0-1017-ibm - 6.8.0-1017.17 linux-headers-ibm - 6.8.0-1017.17 linux-headers-ibm-classic - 6.8.0-1017.17 linux-headers-ibm-lts-24.04 - 6.8.0-1017.17 linux-ibm - 6.8.0-1017.17 linux-ibm-classic - 6.8.0-1017.17 linux-ibm-cloud-tools-common - 6.8.0-1017.17 linux-ibm-headers-6.8.0-1017 - 6.8.0-1017.17 linux-ibm-lts-24.04 - 6.8.0-1017.17 linux-ibm-source-6.8.0 - 6.8.0-1017.17 linux-ibm-tools-6.8.0-1017 - 6.8.0-1017.17 linux-image-6.8.0-1017-ibm - 6.8.0-1017.17 linux-image-ibm - 6.8.0-1017.17 linux-image-ibm-classic - 6.8.0-1017.17 linux-image-ibm-lts-24.04 - 6.8.0-1017.17 linux-image-unsigned-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-extra-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-ibm-classic - 6.8.0-1017.17 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1017.17 linux-tools-6.8.0-1017-ibm - 6.8.0-1017.17 linux-tools-ibm - 6.8.0-1017.17 linux-tools-ibm-classic - 6.8.0-1017.17 linux-tools-ibm-lts-24.04 - 6.8.0-1017.17 No subscription required linux-buildinfo-6.8.0-1017-oracle - 6.8.0-1017.18 linux-buildinfo-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-headers-6.8.0-1017-oracle - 6.8.0-1017.18 linux-headers-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-headers-oracle - 6.8.0-1017.18 linux-headers-oracle-64k - 6.8.0-1017.18 linux-image-6.8.0-1017-oracle - 6.8.0-1017.18 linux-image-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-image-oracle - 6.8.0-1017.18 linux-image-oracle-64k - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-oracle - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-modules-6.8.0-1017-oracle - 6.8.0-1017.18 linux-modules-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-oracle - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-oracle - 6.8.0-1017.18 linux-oracle-64k - 6.8.0-1017.18 linux-oracle-headers-6.8.0-1017 - 6.8.0-1017.18 linux-oracle-tools-6.8.0-1017 - 6.8.0-1017.18 linux-tools-6.8.0-1017-oracle - 6.8.0-1017.18 linux-tools-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-tools-oracle - 6.8.0-1017.18 linux-tools-oracle-64k - 6.8.0-1017.18 No subscription required linux-buildinfo-6.8.0-1018-oem - 6.8.0-1018.18 linux-headers-6.8.0-1018-oem - 6.8.0-1018.18 linux-headers-oem-24.04 - 6.8.0-1018.18 linux-headers-oem-24.04a - 6.8.0-1018.18 linux-image-6.8.0-1018-oem - 6.8.0-1018.18 linux-image-oem-24.04 - 6.8.0-1018.18 linux-image-oem-24.04a - 6.8.0-1018.18 linux-image-uc-6.8.0-1018-oem - 6.8.0-1018.18 linux-image-uc-oem-24.04 - 6.8.0-1018.18 linux-image-uc-oem-24.04a - 6.8.0-1018.18 linux-image-unsigned-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-ipu6-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-ipu6-oem-24.04 - 6.8.0-1018.18 linux-modules-ipu6-oem-24.04a - 6.8.0-1018.18 linux-modules-iwlwifi-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1018.18 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1018.18 linux-modules-usbio-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-usbio-oem-24.04 - 6.8.0-1018.18 linux-modules-usbio-oem-24.04a - 6.8.0-1018.18 linux-oem-24.04 - 6.8.0-1018.18 linux-oem-24.04a - 6.8.0-1018.18 linux-oem-6.8-headers-6.8.0-1018 - 6.8.0-1018.18 linux-oem-6.8-tools-6.8.0-1018 - 6.8.0-1018.18 linux-tools-6.8.0-1018-oem - 6.8.0-1018.18 linux-tools-oem-24.04 - 6.8.0-1018.18 linux-tools-oem-24.04a - 6.8.0-1018.18 No subscription required linux-buildinfo-6.8.0-1019-gcp - 6.8.0-1019.21 linux-gcp - 6.8.0-1019.21 linux-gcp-headers-6.8.0-1019 - 6.8.0-1019.21 linux-gcp-tools-6.8.0-1019 - 6.8.0-1019.21 linux-headers-6.8.0-1019-gcp - 6.8.0-1019.21 linux-headers-gcp - 6.8.0-1019.21 linux-image-6.8.0-1019-gcp - 6.8.0-1019.21 linux-image-gcp - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-extra-gcp - 6.8.0-1019.21 linux-tools-6.8.0-1019-gcp - 6.8.0-1019.21 linux-tools-gcp - 6.8.0-1019.21 No subscription required linux-aws - 6.8.0-1020.22 linux-aws-cloud-tools-6.8.0-1020 - 6.8.0-1020.22 linux-aws-headers-6.8.0-1020 - 6.8.0-1020.22 linux-aws-tools-6.8.0-1020 - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-aws - 6.8.0-1020.22 linux-cloud-tools-6.8.0-1020-aws - 6.8.0-1020.22 linux-headers-6.8.0-1020-aws - 6.8.0-1020.22 linux-headers-aws - 6.8.0-1020.22 linux-image-6.8.0-1020-aws - 6.8.0-1020.22 linux-image-aws - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-extra-aws - 6.8.0-1020.22 linux-tools-6.8.0-1020-aws - 6.8.0-1020.22 linux-tools-aws - 6.8.0-1020.22 No subscription required linux-buildinfo-6.8.0-50-generic - 6.8.0-50.51 linux-buildinfo-6.8.0-50-generic-64k - 6.8.0-50.51 linux-cloud-tools-6.8.0-50 - 6.8.0-50.51 linux-cloud-tools-6.8.0-50-generic - 6.8.0-50.51 linux-cloud-tools-common - 6.8.0-50.51 linux-cloud-tools-generic - 6.8.0-50.51 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-50.51 linux-cloud-tools-virtual - 6.8.0-50.51 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-50.51 linux-crashdump - 6.8.0-50.51 linux-doc - 6.8.0-50.51 linux-generic - 6.8.0-50.51 linux-generic-64k - 6.8.0-50.51 linux-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-generic-hwe-24.04 - 6.8.0-50.51 linux-generic-lpae - 6.8.0-50.51 linux-headers-6.8.0-50 - 6.8.0-50.51 linux-headers-6.8.0-50-generic - 6.8.0-50.51 linux-headers-6.8.0-50-generic-64k - 6.8.0-50.51 linux-headers-generic - 6.8.0-50.51 linux-headers-generic-64k - 6.8.0-50.51 linux-headers-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-headers-generic-hwe-24.04 - 6.8.0-50.51 linux-headers-generic-lpae - 6.8.0-50.51 linux-headers-kvm - 6.8.0-50.51 linux-headers-laptop-23.10 - 6.8.0-50.51 linux-headers-oem-20.04 - 6.8.0-50.51 linux-headers-oem-20.04b - 6.8.0-50.51 linux-headers-oem-20.04c - 6.8.0-50.51 linux-headers-oem-20.04d - 6.8.0-50.51 linux-headers-oem-22.04 - 6.8.0-50.51 linux-headers-virtual - 6.8.0-50.51 linux-headers-virtual-hwe-24.04 - 6.8.0-50.51 linux-image-6.8.0-50-generic - 6.8.0-50.51 linux-image-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-extra-virtual - 6.8.0-50.51 linux-image-extra-virtual-hwe-24.04 - 6.8.0-50.51 linux-image-generic - 6.8.0-50.51 linux-image-generic-64k - 6.8.0-50.51 linux-image-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-image-generic-hwe-24.04 - 6.8.0-50.51 linux-image-generic-lpae - 6.8.0-50.51 linux-image-kvm - 6.8.0-50.51 linux-image-laptop-23.10 - 6.8.0-50.51 linux-image-oem-20.04 - 6.8.0-50.51 linux-image-oem-20.04b - 6.8.0-50.51 linux-image-oem-20.04c - 6.8.0-50.51 linux-image-oem-20.04d - 6.8.0-50.51 linux-image-oem-22.04 - 6.8.0-50.51 linux-image-uc-6.8.0-50-generic - 6.8.0-50.51 linux-image-uc-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-uc-generic - 6.8.0-50.51 linux-image-uc-generic-hwe-24.04 - 6.8.0-50.51 linux-image-unsigned-6.8.0-50-generic - 6.8.0-50.51 linux-image-unsigned-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-virtual - 6.8.0-50.51 linux-image-virtual-hwe-24.04 - 6.8.0-50.51 linux-kvm - 6.8.0-50.51 linux-laptop-23.10 - 6.8.0-50.51 linux-lib-rust-6.8.0-50-generic - 6.8.0-50.51 linux-libc-dev - 6.8.0-50.51 linux-modules-6.8.0-50-generic - 6.8.0-50.51 linux-modules-6.8.0-50-generic-64k - 6.8.0-50.51 linux-modules-extra-6.8.0-50-generic - 6.8.0-50.51 linux-modules-ipu6-6.8.0-50-generic - 6.8.0-50.51 linux-modules-ipu6-generic - 6.8.0-50.51 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-50.51 linux-modules-iwlwifi-6.8.0-50-generic - 6.8.0-50.51 linux-modules-iwlwifi-generic - 6.8.0-50.51 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-50.51 linux-modules-iwlwifi-oem-20.04 - 6.8.0-50.51 linux-modules-iwlwifi-oem-20.04d - 6.8.0-50.51 linux-modules-iwlwifi-oem-22.04 - 6.8.0-50.51 linux-modules-usbio-6.8.0-50-generic - 6.8.0-50.51 linux-modules-usbio-generic - 6.8.0-50.51 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-50.51 linux-oem-20.04 - 6.8.0-50.51 linux-oem-20.04b - 6.8.0-50.51 linux-oem-20.04c - 6.8.0-50.51 linux-oem-20.04d - 6.8.0-50.51 linux-oem-22.04 - 6.8.0-50.51 linux-source - 6.8.0-50.51 linux-source-6.8.0 - 6.8.0-50.51 linux-tools-6.8.0-50 - 6.8.0-50.51 linux-tools-6.8.0-50-generic - 6.8.0-50.51 linux-tools-6.8.0-50-generic-64k - 6.8.0-50.51 linux-tools-common - 6.8.0-50.51 linux-tools-generic - 6.8.0-50.51 linux-tools-generic-64k - 6.8.0-50.51 linux-tools-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-tools-generic-hwe-24.04 - 6.8.0-50.51 linux-tools-generic-lpae - 6.8.0-50.51 linux-tools-host - 6.8.0-50.51 linux-tools-kvm - 6.8.0-50.51 linux-tools-laptop-23.10 - 6.8.0-50.51 linux-tools-oem-20.04 - 6.8.0-50.51 linux-tools-oem-20.04b - 6.8.0-50.51 linux-tools-oem-20.04c - 6.8.0-50.51 linux-tools-oem-20.04d - 6.8.0-50.51 linux-tools-oem-22.04 - 6.8.0-50.51 linux-tools-virtual - 6.8.0-50.51 linux-tools-virtual-hwe-24.04 - 6.8.0-50.51 linux-virtual - 6.8.0-50.51 linux-virtual-hwe-24.04 - 6.8.0-50.51 No subscription required linux-buildinfo-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-buildinfo-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-cloud-tools-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-cloud-tools-lowlatency - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-headers-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-headers-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-headers-lowlatency - 6.8.0-50.51.1 linux-headers-lowlatency-64k - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-image-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-image-lowlatency - 6.8.0-50.51.1 linux-image-lowlatency-64k - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-unsigned-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-image-unsigned-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-lowlatency - 6.8.0-50.51.1 linux-lowlatency-64k - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-lowlatency-cloud-tools-6.8.0-50 - 6.8.0-50.51.1 linux-lowlatency-headers-6.8.0-50 - 6.8.0-50.51.1 linux-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-lowlatency-lib-rust-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-lowlatency-tools-6.8.0-50 - 6.8.0-50.51.1 linux-modules-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-modules-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-modules-iwlwifi-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-tools-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-tools-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-tools-lowlatency - 6.8.0-50.51.1 linux-tools-lowlatency-64k - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 No subscription required
Medium
CVE-2023-52889
CVE-2023-52918
CVE-2024-39472
CVE-2024-42258
CVE-2024-42259
CVE-2024-42260
CVE-2024-42261
CVE-2024-42262
CVE-2024-42263
CVE-2024-42264
CVE-2024-42265
CVE-2024-42267
CVE-2024-42268
CVE-2024-42269
CVE-2024-42270
CVE-2024-42272
CVE-2024-42273
CVE-2024-42274
CVE-2024-42276
CVE-2024-42277
CVE-2024-42278
CVE-2024-42279
CVE-2024-42281
CVE-2024-42283
CVE-2024-42284
CVE-2024-42285
CVE-2024-42286
CVE-2024-42287
CVE-2024-42288
CVE-2024-42289
CVE-2024-42290
CVE-2024-42291
CVE-2024-42292
CVE-2024-42294
CVE-2024-42295
CVE-2024-42296
CVE-2024-42297
CVE-2024-42298
CVE-2024-42299
CVE-2024-42301
CVE-2024-42302
CVE-2024-42303
CVE-2024-42304
CVE-2024-42305
CVE-2024-42306
CVE-2024-42307
CVE-2024-42309
CVE-2024-42310
CVE-2024-42311
CVE-2024-42312
CVE-2024-42313
CVE-2024-42314
CVE-2024-42315
CVE-2024-42316
CVE-2024-42317
CVE-2024-42318
CVE-2024-42319
CVE-2024-42320
CVE-2024-42321
CVE-2024-42322
CVE-2024-43817
CVE-2024-43818
CVE-2024-43819
CVE-2024-43820
CVE-2024-43821
CVE-2024-43823
CVE-2024-43824
CVE-2024-43825
CVE-2024-43826
CVE-2024-43827
CVE-2024-43828
CVE-2024-43829
CVE-2024-43830
CVE-2024-43831
CVE-2024-43832
CVE-2024-43833
CVE-2024-43834
CVE-2024-43835
CVE-2024-43837
CVE-2024-43839
CVE-2024-43840
CVE-2024-43841
CVE-2024-43842
CVE-2024-43843
CVE-2024-43845
CVE-2024-43846
CVE-2024-43847
CVE-2024-43849
CVE-2024-43850
CVE-2024-43852
CVE-2024-43853
CVE-2024-43854
CVE-2024-43856
CVE-2024-43857
CVE-2024-43859
CVE-2024-43860
CVE-2024-43861
CVE-2024-43863
CVE-2024-43864
CVE-2024-43866
CVE-2024-43867
CVE-2024-43868
CVE-2024-43869
CVE-2024-43870
CVE-2024-43871
CVE-2024-43873
CVE-2024-43875
CVE-2024-43876
CVE-2024-43877
CVE-2024-43879
CVE-2024-43880
CVE-2024-43881
CVE-2024-43883
CVE-2024-43884
CVE-2024-43886
CVE-2024-43887
CVE-2024-43888
CVE-2024-43889
CVE-2024-43890
CVE-2024-43891
CVE-2024-43892
CVE-2024-43893
CVE-2024-43894
CVE-2024-43895
CVE-2024-43899
CVE-2024-43900
CVE-2024-43902
CVE-2024-43904
CVE-2024-43905
CVE-2024-43906
CVE-2024-43907
CVE-2024-43908
CVE-2024-43909
CVE-2024-43910
CVE-2024-43911
CVE-2024-43912
CVE-2024-43913
CVE-2024-43914
CVE-2024-44931
CVE-2024-44934
CVE-2024-44935
CVE-2024-44937
CVE-2024-44938
CVE-2024-44939
CVE-2024-44940
CVE-2024-44941
CVE-2024-44942
CVE-2024-44943
CVE-2024-44944
CVE-2024-44946
CVE-2024-44947
CVE-2024-44948
CVE-2024-44950
CVE-2024-44953
CVE-2024-44954
CVE-2024-44956
CVE-2024-44957
CVE-2024-44958
CVE-2024-44959
CVE-2024-44960
CVE-2024-44961
CVE-2024-44962
CVE-2024-44963
CVE-2024-44965
CVE-2024-44966
CVE-2024-44967
CVE-2024-44969
CVE-2024-44970
CVE-2024-44971
CVE-2024-44972
CVE-2024-44973
CVE-2024-44974
CVE-2024-44975
CVE-2024-44977
CVE-2024-44978
CVE-2024-44979
CVE-2024-44980
CVE-2024-44982
CVE-2024-44983
CVE-2024-44984
CVE-2024-44985
CVE-2024-44986
CVE-2024-44987
CVE-2024-44988
CVE-2024-44989
CVE-2024-44990
CVE-2024-44991
CVE-2024-44993
CVE-2024-44995
CVE-2024-44996
CVE-2024-44998
CVE-2024-44999
CVE-2024-45000
CVE-2024-45001
CVE-2024-45002
CVE-2024-45003
CVE-2024-45005
CVE-2024-45006
CVE-2024-45007
CVE-2024-45008
CVE-2024-45009
CVE-2024-45010
CVE-2024-45011
CVE-2024-45012
CVE-2024-45013
CVE-2024-45015
CVE-2024-45017
CVE-2024-45018
CVE-2024-45019
CVE-2024-45020
CVE-2024-45021
CVE-2024-45022
CVE-2024-45025
CVE-2024-45026
CVE-2024-45027
CVE-2024-45028
CVE-2024-45029
CVE-2024-45030
CVE-2024-46672
CVE-2024-46673
CVE-2024-46675
CVE-2024-46676
CVE-2024-46677
CVE-2024-46678
CVE-2024-46679
CVE-2024-46680
CVE-2024-46681
CVE-2024-46683
CVE-2024-46685
CVE-2024-46686
CVE-2024-46687
CVE-2024-46689
CVE-2024-46691
CVE-2024-46692
CVE-2024-46693
CVE-2024-46694
CVE-2024-46695
CVE-2024-46697
CVE-2024-46698
CVE-2024-46701
CVE-2024-46702
CVE-2024-46703
CVE-2024-46705
CVE-2024-46706
CVE-2024-46707
CVE-2024-46708
CVE-2024-46709
CVE-2024-46710
CVE-2024-46711
CVE-2024-46713
CVE-2024-46714
CVE-2024-46715
CVE-2024-46716
CVE-2024-46717
CVE-2024-46718
CVE-2024-46719
CVE-2024-46720
CVE-2024-46721
CVE-2024-46722
CVE-2024-46723
CVE-2024-46724
CVE-2024-46725
CVE-2024-46726
CVE-2024-46727
CVE-2024-46728
CVE-2024-46729
CVE-2024-46730
CVE-2024-46731
CVE-2024-46732
CVE-2024-46733
CVE-2024-46735
CVE-2024-46737
CVE-2024-46738
CVE-2024-46739
CVE-2024-46740
CVE-2024-46741
CVE-2024-46743
CVE-2024-46744
CVE-2024-46745
CVE-2024-46746
CVE-2024-46747
CVE-2024-46749
CVE-2024-46750
CVE-2024-46751
CVE-2024-46752
CVE-2024-46753
CVE-2024-46754
CVE-2024-46755
CVE-2024-46759
CVE-2024-46760
CVE-2024-46761
CVE-2024-46762
CVE-2024-46763
CVE-2024-46765
CVE-2024-46766
CVE-2024-46767
CVE-2024-46768
CVE-2024-46770
CVE-2024-46771
CVE-2024-46772
CVE-2024-46773
CVE-2024-46774
CVE-2024-46775
CVE-2024-46776
CVE-2024-46777
CVE-2024-46778
CVE-2024-46779
CVE-2024-46780
CVE-2024-46781
CVE-2024-46782
CVE-2024-46783
CVE-2024-46784
CVE-2024-46785
CVE-2024-46786
CVE-2024-46787
CVE-2024-46788
CVE-2024-46791
CVE-2024-46792
CVE-2024-46793
CVE-2024-46794
CVE-2024-46795
CVE-2024-46797
CVE-2024-46798
CVE-2024-46802
CVE-2024-46803
CVE-2024-46804
CVE-2024-46805
CVE-2024-46806
CVE-2024-46807
CVE-2024-46808
CVE-2024-46809
CVE-2024-46810
CVE-2024-46811
CVE-2024-46812
CVE-2024-46813
CVE-2024-46814
CVE-2024-46815
CVE-2024-46816
CVE-2024-46817
CVE-2024-46818
CVE-2024-46819
CVE-2024-46821
CVE-2024-46822
CVE-2024-46823
CVE-2024-46824
CVE-2024-46825
CVE-2024-46826
CVE-2024-46827
CVE-2024-46828
CVE-2024-46829
CVE-2024-46830
CVE-2024-46831
CVE-2024-46832
CVE-2024-46834
CVE-2024-46835
CVE-2024-46836
CVE-2024-46838
CVE-2024-46840
CVE-2024-46841
CVE-2024-46842
CVE-2024-46843
CVE-2024-46844
CVE-2024-46845
CVE-2024-46846
CVE-2024-46847
CVE-2024-46848
CVE-2024-46849
CVE-2024-46850
CVE-2024-46851
CVE-2024-46852
CVE-2024-46853
CVE-2024-46854
CVE-2024-46855
CVE-2024-46857
CVE-2024-46858
CVE-2024-46859
CVE-2024-46860
CVE-2024-46861
CVE-2024-46864
CVE-2024-46866
CVE-2024-46867
CVE-2024-46868
CVE-2024-46870
CVE-2024-46871
CVE-2024-47658
CVE-2024-47659
CVE-2024-47660
CVE-2024-47661
CVE-2024-47662
CVE-2024-47663
CVE-2024-47664
CVE-2024-47665
CVE-2024-47666
CVE-2024-47667
CVE-2024-47668
CVE-2024-47669
CVE-2024-47674
CVE-2024-47683
CVE-2024-49984
USN-7155-1 -- Linux kernel (NVIDIA) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-43845, CVE-2024-42311, CVE-2024-46757, CVE-2024-46738, CVE-2024-44961, CVE-2024-44935, CVE-2024-46845, CVE-2024-46783, CVE-2024-42315, CVE-2023-52918, CVE-2024-46708, CVE-2024-44934, CVE-2024-42298, CVE-2024-46786, CVE-2024-46778, CVE-2024-44960, CVE-2024-42295, CVE-2024-43881, CVE-2024-44971, CVE-2024-43849, CVE-2024-43914, CVE-2024-44962, CVE-2024-43841, CVE-2024-46794, CVE-2024-46752, CVE-2024-46853, CVE-2024-46861, CVE-2024-47664, CVE-2024-46717, CVE-2024-46806, CVE-2024-46797, CVE-2024-42261, CVE-2024-46828, CVE-2024-45013, CVE-2024-46870, CVE-2024-42258, CVE-2024-46689, CVE-2024-43818, CVE-2024-46762, CVE-2024-46825, CVE-2024-46698, CVE-2024-46816, CVE-2024-46728, CVE-2024-46726, CVE-2024-43835, CVE-2024-45000, CVE-2024-43850, CVE-2024-43840, CVE-2024-46846, CVE-2024-43846, CVE-2024-46725, CVE-2024-46867, CVE-2024-42310, CVE-2024-42274, CVE-2024-46760, CVE-2024-46683, CVE-2024-42304, CVE-2024-43839, CVE-2024-44954, CVE-2024-43895, CVE-2024-44967, CVE-2024-43889, CVE-2024-46854, CVE-2024-46860, CVE-2024-45029, CVE-2024-44938, CVE-2024-46785, CVE-2024-46713, CVE-2024-46715, CVE-2024-46731, CVE-2024-42297, CVE-2024-43912, CVE-2024-46751, CVE-2024-46711, CVE-2024-46695, CVE-2024-42317, CVE-2024-44957, CVE-2024-46792, CVE-2024-45020, CVE-2024-44985, CVE-2024-46746, CVE-2024-43868, CVE-2024-45017, CVE-2024-46824, CVE-2024-46787, CVE-2024-42288, CVE-2024-46681, CVE-2024-42306, CVE-2024-46755, CVE-2024-46826, CVE-2024-46777, CVE-2024-46844, CVE-2024-44972, CVE-2024-43883, CVE-2024-43909, CVE-2024-46676, CVE-2024-46798, CVE-2024-42273, CVE-2024-44990, CVE-2024-46744, CVE-2024-42305, CVE-2024-45006, CVE-2024-42309, CVE-2024-46722, CVE-2024-44956, CVE-2024-46739, CVE-2024-46680, CVE-2024-46765, CVE-2024-46714, CVE-2024-46771, CVE-2024-46847, CVE-2024-43879, CVE-2024-46703, CVE-2024-46733, CVE-2024-46815, CVE-2024-46802, CVE-2024-45027, CVE-2024-42281, CVE-2024-43891, CVE-2024-45030, CVE-2024-47662, CVE-2024-43887, CVE-2024-46836, CVE-2024-46782, CVE-2024-46835, CVE-2024-43907, CVE-2024-46779, CVE-2024-43869, CVE-2024-43821, CVE-2024-44978, CVE-2024-42286, CVE-2023-52889, CVE-2024-43852, CVE-2024-42320, CVE-2024-44931, CVE-2024-44993, CVE-2024-46829, CVE-2024-46701, CVE-2024-42272, CVE-2024-47660, CVE-2024-49984, CVE-2024-44973, CVE-2024-43817, CVE-2024-42322, CVE-2024-43830, CVE-2024-42301, CVE-2024-44969, CVE-2024-47674, CVE-2024-46702, CVE-2024-45025, CVE-2024-46710, CVE-2024-43866, CVE-2024-46718, CVE-2024-46773, CVE-2024-43834, CVE-2024-46754, CVE-2024-46871, CVE-2024-44942, CVE-2024-43913, CVE-2024-46818, CVE-2024-42318, CVE-2024-43831, CVE-2024-43832, CVE-2024-43908, CVE-2024-43827, CVE-2024-46737, CVE-2024-47665, CVE-2024-43854, CVE-2024-46707, CVE-2024-42303, CVE-2024-43860, CVE-2024-43824, CVE-2024-45019, CVE-2024-44984, CVE-2024-46813, CVE-2024-45022, CVE-2024-44970, CVE-2024-46791, CVE-2024-45012, CVE-2024-43829, CVE-2024-46850, CVE-2024-44987, CVE-2024-44940, CVE-2024-43864, CVE-2024-46723, CVE-2024-44999, CVE-2024-43884, CVE-2024-42287, CVE-2024-46675, CVE-2024-44974, CVE-2024-46721, CVE-2024-44937, CVE-2024-45008, CVE-2024-43853, CVE-2024-46697, CVE-2024-43899, CVE-2024-43823, CVE-2024-46747, CVE-2024-45007, CVE-2024-46822, CVE-2024-42262, CVE-2024-47661, CVE-2024-44953, CVE-2024-46859, CVE-2024-46694, CVE-2024-42279, CVE-2024-43873, CVE-2024-43828, CVE-2024-46851, CVE-2024-42296, CVE-2024-46719, CVE-2024-46677, CVE-2024-42259, CVE-2024-44941, CVE-2024-44946, CVE-2024-46745, CVE-2024-42299, CVE-2024-46724, CVE-2024-46749, CVE-2024-46706, CVE-2024-42267, CVE-2024-46774, CVE-2024-46685, CVE-2024-42292, CVE-2024-47667, CVE-2024-42319, CVE-2024-43888, CVE-2024-46729, CVE-2024-44947, CVE-2024-45003, CVE-2024-46827, CVE-2024-46693, CVE-2024-46705, CVE-2024-46767, CVE-2024-46838, CVE-2024-46805, CVE-2024-43904, CVE-2024-43906, CVE-2024-42265, CVE-2024-42278, CVE-2024-46750, CVE-2024-46692, CVE-2024-43847, CVE-2024-44995, CVE-2024-43825, CVE-2024-46803, CVE-2024-47669, CVE-2024-46830, CVE-2024-46784, CVE-2024-46840, CVE-2024-44939, CVE-2024-46848, CVE-2024-42313, CVE-2024-46823, CVE-2024-44989, CVE-2024-42270, CVE-2024-43856, CVE-2024-46716, CVE-2024-43859, CVE-2024-46841, CVE-2024-47658, CVE-2024-46811, CVE-2024-45028, CVE-2024-46781, CVE-2024-42290, CVE-2024-44991, CVE-2024-43894, CVE-2024-44979, CVE-2024-46804, CVE-2024-43826, CVE-2024-43877, CVE-2024-42284, CVE-2024-43876, CVE-2024-45011, CVE-2024-43819, CVE-2024-46709, CVE-2024-43867, CVE-2024-44963, CVE-2024-45010, CVE-2024-46753, CVE-2024-46759, CVE-2024-43880, CVE-2024-44977, CVE-2024-46772, CVE-2024-44950, CVE-2024-46687, CVE-2024-46834, CVE-2024-43911, CVE-2024-45015, CVE-2024-46819, CVE-2024-43875, CVE-2024-44996, CVE-2024-44988, CVE-2024-46673, CVE-2024-44943, CVE-2024-42316, CVE-2024-47683, CVE-2024-42307, CVE-2024-46788, CVE-2024-43892, CVE-2024-47659, CVE-2024-46857, CVE-2024-43820, CVE-2024-46832, CVE-2024-42312, CVE-2024-43910, CVE-2024-43886, CVE-2024-43905, CVE-2024-46766, CVE-2024-42263, CVE-2024-46821, CVE-2024-43842, CVE-2024-43857, CVE-2024-42276, CVE-2024-42268, CVE-2024-46740, CVE-2024-46843, CVE-2024-46807, CVE-2024-46780, CVE-2024-46678, CVE-2024-44944, CVE-2024-42264, CVE-2024-43863, CVE-2024-39472, CVE-2024-46691, CVE-2024-44959, CVE-2024-44958, CVE-2024-46679, CVE-2024-43843, CVE-2024-43900, CVE-2024-45021, CVE-2024-44982, CVE-2024-46793, CVE-2024-42260, CVE-2024-43890, CVE-2024-43871, CVE-2024-42269, CVE-2024-42277, CVE-2024-46720, CVE-2024-45005, CVE-2024-46727, CVE-2024-46808, CVE-2024-46852, CVE-2024-47668, CVE-2024-42321, CVE-2024-46743, CVE-2024-45002, CVE-2024-46763, CVE-2024-46817, CVE-2024-42285, CVE-2024-46770, CVE-2024-45026, CVE-2024-46768, CVE-2024-42314, CVE-2024-42291, CVE-2024-46756, CVE-2024-42283, CVE-2024-45018, CVE-2024-44966, CVE-2024-42289, CVE-2024-42294, CVE-2024-46814, CVE-2024-44986, CVE-2024-43870, CVE-2024-44980, CVE-2024-43902, CVE-2024-47666, CVE-2024-46864, CVE-2024-46761, CVE-2024-46831, CVE-2024-46758, CVE-2024-46735, CVE-2024-46858, CVE-2024-46795, CVE-2024-46810, CVE-2024-46849, CVE-2024-46775, CVE-2024-46868, CVE-2024-46809, CVE-2024-46776, CVE-2024-46866, CVE-2024-44983, CVE-2024-46741, CVE-2024-43837, CVE-2024-43833, CVE-2024-46672, CVE-2024-43861, CVE-2024-42302, CVE-2024-47663, CVE-2024-46812, CVE-2024-43893, CVE-2024-46686, CVE-2024-44948, CVE-2024-46732, CVE-2024-44965, CVE-2024-46855, CVE-2024-45009, CVE-2024-46842, CVE-2024-46730, CVE-2024-44975, CVE-2024-44998) Update Instructions: Run `sudo pro fix USN-7155-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-buildinfo-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-cloud-tools-nvidia - 6.8.0-1019.21 linux-headers-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-headers-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-headers-nvidia - 6.8.0-1019.21 linux-headers-nvidia-64k - 6.8.0-1019.21 linux-image-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-image-nvidia - 6.8.0-1019.21 linux-image-nvidia-64k - 6.8.0-1019.21 linux-image-uc-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-uc-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-nvidia-fs-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1019.21 linux-nvidia - 6.8.0-1019.21 linux-nvidia-64k - 6.8.0-1019.21 linux-nvidia-headers-6.8.0-1019 - 6.8.0-1019.21 linux-nvidia-tools-6.8.0-1019 - 6.8.0-1019.21 linux-tools-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-tools-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-tools-nvidia - 6.8.0-1019.21 linux-tools-nvidia-64k - 6.8.0-1019.21 No subscription required linux-buildinfo-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-buildinfo-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-headers-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-uc-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-uc-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-unsigned-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-unsigned-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-extra-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-nvidia-lowlatency - 6.8.0-1019.21.1 linux-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-nvidia-lowlatency-headers-6.8.0-1019 - 6.8.0-1019.21.1 linux-nvidia-lowlatency-tools-6.8.0-1019 - 6.8.0-1019.21.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1019.21.1 linux-tools-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-tools-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-tools-nvidia-lowlatency - 6.8.0-1019.21.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1019.21.1 No subscription required
Medium
CVE-2023-52889
CVE-2023-52918
CVE-2024-39472
CVE-2024-42258
CVE-2024-42259
CVE-2024-42260
CVE-2024-42261
CVE-2024-42262
CVE-2024-42263
CVE-2024-42264
CVE-2024-42265
CVE-2024-42267
CVE-2024-42268
CVE-2024-42269
CVE-2024-42270
CVE-2024-42272
CVE-2024-42273
CVE-2024-42274
CVE-2024-42276
CVE-2024-42277
CVE-2024-42278
CVE-2024-42279
CVE-2024-42281
CVE-2024-42283
CVE-2024-42284
CVE-2024-42285
CVE-2024-42286
CVE-2024-42287
CVE-2024-42288
CVE-2024-42289
CVE-2024-42290
CVE-2024-42291
CVE-2024-42292
CVE-2024-42294
CVE-2024-42295
CVE-2024-42296
CVE-2024-42297
CVE-2024-42298
CVE-2024-42299
CVE-2024-42301
CVE-2024-42302
CVE-2024-42303
CVE-2024-42304
CVE-2024-42305
CVE-2024-42306
CVE-2024-42307
CVE-2024-42309
CVE-2024-42310
CVE-2024-42311
CVE-2024-42312
CVE-2024-42313
CVE-2024-42314
CVE-2024-42315
CVE-2024-42316
CVE-2024-42317
CVE-2024-42318
CVE-2024-42319
CVE-2024-42320
CVE-2024-42321
CVE-2024-42322
CVE-2024-43817
CVE-2024-43818
CVE-2024-43819
CVE-2024-43820
CVE-2024-43821
CVE-2024-43823
CVE-2024-43824
CVE-2024-43825
CVE-2024-43826
CVE-2024-43827
CVE-2024-43828
CVE-2024-43829
CVE-2024-43830
CVE-2024-43831
CVE-2024-43832
CVE-2024-43833
CVE-2024-43834
CVE-2024-43835
CVE-2024-43837
CVE-2024-43839
CVE-2024-43840
CVE-2024-43841
CVE-2024-43842
CVE-2024-43843
CVE-2024-43845
CVE-2024-43846
CVE-2024-43847
CVE-2024-43849
CVE-2024-43850
CVE-2024-43852
CVE-2024-43853
CVE-2024-43854
CVE-2024-43856
CVE-2024-43857
CVE-2024-43859
CVE-2024-43860
CVE-2024-43861
CVE-2024-43863
CVE-2024-43864
CVE-2024-43866
CVE-2024-43867
CVE-2024-43868
CVE-2024-43869
CVE-2024-43870
CVE-2024-43871
CVE-2024-43873
CVE-2024-43875
CVE-2024-43876
CVE-2024-43877
CVE-2024-43879
CVE-2024-43880
CVE-2024-43881
CVE-2024-43883
CVE-2024-43884
CVE-2024-43886
CVE-2024-43887
CVE-2024-43888
CVE-2024-43889
CVE-2024-43890
CVE-2024-43891
CVE-2024-43892
CVE-2024-43893
CVE-2024-43894
CVE-2024-43895
CVE-2024-43899
CVE-2024-43900
CVE-2024-43902
CVE-2024-43904
CVE-2024-43905
CVE-2024-43906
CVE-2024-43907
CVE-2024-43908
CVE-2024-43909
CVE-2024-43910
CVE-2024-43911
CVE-2024-43912
CVE-2024-43913
CVE-2024-43914
CVE-2024-44931
CVE-2024-44934
CVE-2024-44935
CVE-2024-44937
CVE-2024-44938
CVE-2024-44939
CVE-2024-44940
CVE-2024-44941
CVE-2024-44942
CVE-2024-44943
CVE-2024-44944
CVE-2024-44946
CVE-2024-44947
CVE-2024-44948
CVE-2024-44950
CVE-2024-44953
CVE-2024-44954
CVE-2024-44956
CVE-2024-44957
CVE-2024-44958
CVE-2024-44959
CVE-2024-44960
CVE-2024-44961
CVE-2024-44962
CVE-2024-44963
CVE-2024-44965
CVE-2024-44966
CVE-2024-44967
CVE-2024-44969
CVE-2024-44970
CVE-2024-44971
CVE-2024-44972
CVE-2024-44973
CVE-2024-44974
CVE-2024-44975
CVE-2024-44977
CVE-2024-44978
CVE-2024-44979
CVE-2024-44980
CVE-2024-44982
CVE-2024-44983
CVE-2024-44984
CVE-2024-44985
CVE-2024-44986
CVE-2024-44987
CVE-2024-44988
CVE-2024-44989
CVE-2024-44990
CVE-2024-44991
CVE-2024-44993
CVE-2024-44995
CVE-2024-44996
CVE-2024-44998
CVE-2024-44999
CVE-2024-45000
CVE-2024-45002
CVE-2024-45003
CVE-2024-45005
CVE-2024-45006
CVE-2024-45007
CVE-2024-45008
CVE-2024-45009
CVE-2024-45010
CVE-2024-45011
CVE-2024-45012
CVE-2024-45013
CVE-2024-45015
CVE-2024-45017
CVE-2024-45018
CVE-2024-45019
CVE-2024-45020
CVE-2024-45021
CVE-2024-45022
CVE-2024-45025
CVE-2024-45026
CVE-2024-45027
CVE-2024-45028
CVE-2024-45029
CVE-2024-45030
CVE-2024-46672
CVE-2024-46673
CVE-2024-46675
CVE-2024-46676
CVE-2024-46677
CVE-2024-46678
CVE-2024-46679
CVE-2024-46680
CVE-2024-46681
CVE-2024-46683
CVE-2024-46685
CVE-2024-46686
CVE-2024-46687
CVE-2024-46689
CVE-2024-46691
CVE-2024-46692
CVE-2024-46693
CVE-2024-46694
CVE-2024-46695
CVE-2024-46697
CVE-2024-46698
CVE-2024-46701
CVE-2024-46702
CVE-2024-46703
CVE-2024-46705
CVE-2024-46706
CVE-2024-46707
CVE-2024-46708
CVE-2024-46709
CVE-2024-46710
CVE-2024-46711
CVE-2024-46713
CVE-2024-46714
CVE-2024-46715
CVE-2024-46716
CVE-2024-46717
CVE-2024-46718
CVE-2024-46719
CVE-2024-46720
CVE-2024-46721
CVE-2024-46722
CVE-2024-46723
CVE-2024-46724
CVE-2024-46725
CVE-2024-46726
CVE-2024-46727
CVE-2024-46728
CVE-2024-46729
CVE-2024-46730
CVE-2024-46731
CVE-2024-46732
CVE-2024-46733
CVE-2024-46735
CVE-2024-46737
CVE-2024-46738
CVE-2024-46739
CVE-2024-46740
CVE-2024-46741
CVE-2024-46743
CVE-2024-46744
CVE-2024-46745
CVE-2024-46746
CVE-2024-46747
CVE-2024-46749
CVE-2024-46750
CVE-2024-46751
CVE-2024-46752
CVE-2024-46753
CVE-2024-46754
CVE-2024-46755
CVE-2024-46759
CVE-2024-46760
CVE-2024-46761
CVE-2024-46762
CVE-2024-46763
CVE-2024-46765
CVE-2024-46766
CVE-2024-46767
CVE-2024-46768
CVE-2024-46770
CVE-2024-46771
CVE-2024-46772
CVE-2024-46773
CVE-2024-46774
CVE-2024-46775
CVE-2024-46776
CVE-2024-46777
CVE-2024-46778
CVE-2024-46779
CVE-2024-46780
CVE-2024-46781
CVE-2024-46782
CVE-2024-46783
CVE-2024-46784
CVE-2024-46785
CVE-2024-46786
CVE-2024-46787
CVE-2024-46788
CVE-2024-46791
CVE-2024-46792
CVE-2024-46793
CVE-2024-46794
CVE-2024-46795
CVE-2024-46797
CVE-2024-46798
CVE-2024-46802
CVE-2024-46803
CVE-2024-46804
CVE-2024-46805
CVE-2024-46806
CVE-2024-46807
CVE-2024-46808
CVE-2024-46809
CVE-2024-46810
CVE-2024-46811
CVE-2024-46812
CVE-2024-46813
CVE-2024-46814
CVE-2024-46815
CVE-2024-46816
CVE-2024-46817
CVE-2024-46818
CVE-2024-46819
CVE-2024-46821
CVE-2024-46822
CVE-2024-46823
CVE-2024-46824
CVE-2024-46825
CVE-2024-46826
CVE-2024-46827
CVE-2024-46828
CVE-2024-46829
CVE-2024-46830
CVE-2024-46831
CVE-2024-46832
CVE-2024-46834
CVE-2024-46835
CVE-2024-46836
CVE-2024-46838
CVE-2024-46840
CVE-2024-46841
CVE-2024-46842
CVE-2024-46843
CVE-2024-46844
CVE-2024-46845
CVE-2024-46846
CVE-2024-46847
CVE-2024-46848
CVE-2024-46849
CVE-2024-46850
CVE-2024-46851
CVE-2024-46852
CVE-2024-46853
CVE-2024-46854
CVE-2024-46855
CVE-2024-46857
CVE-2024-46858
CVE-2024-46859
CVE-2024-46860
CVE-2024-46861
CVE-2024-46864
CVE-2024-46866
CVE-2024-46867
CVE-2024-46868
CVE-2024-46870
CVE-2024-46871
CVE-2024-47658
CVE-2024-47659
CVE-2024-47660
CVE-2024-47661
CVE-2024-47662
CVE-2024-47663
CVE-2024-47664
CVE-2024-47665
CVE-2024-47666
CVE-2024-47667
CVE-2024-47668
CVE-2024-47669
CVE-2024-47674
CVE-2024-47683
CVE-2024-49984
USN-7156-1 -- Linux kernel (GKE) vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Android drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - Null block device driver; - Ublk userspace block driver; - Bluetooth drivers; - Cdrom driver; - Character device driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Cirrus firmware drivers; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - ISDN/mISDN subsystem; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Serial drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Syscall compatibility layer; - Memory Management; - Memory management; - Objagg library; - Perf events; - Syscall interfaces; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Closures library; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Ceph Core library; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Network traffic control; - SCTP protocol; - Sun RPC protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - MediaTek ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-43911, CVE-2024-46762, CVE-2024-46794, CVE-2024-43843, CVE-2024-42229, CVE-2024-43888, CVE-2024-44978, CVE-2024-46693, CVE-2024-46695, CVE-2024-42290, CVE-2024-42067, CVE-2024-45012, CVE-2024-42316, CVE-2024-47665, CVE-2024-41052, CVE-2024-42074, CVE-2024-41058, CVE-2024-44975, CVE-2024-46709, CVE-2024-46871, CVE-2024-42090, CVE-2024-42296, CVE-2024-42096, CVE-2024-42146, CVE-2024-46855, CVE-2024-39487, CVE-2024-43825, CVE-2024-42066, CVE-2024-42126, CVE-2024-41022, CVE-2024-41025, CVE-2023-52888, CVE-2024-46702, CVE-2024-42269, CVE-2024-41082, CVE-2024-42284, CVE-2024-42227, CVE-2024-41017, CVE-2024-42250, CVE-2024-46778, CVE-2024-47661, CVE-2024-46727, CVE-2024-46845, CVE-2024-44953, CVE-2024-47659, CVE-2024-42137, CVE-2024-42245, CVE-2024-41096, CVE-2024-46829, CVE-2024-41053, CVE-2024-46782, CVE-2024-44972, CVE-2024-41095, CVE-2024-42239, CVE-2024-42127, CVE-2024-42292, CVE-2024-46752, CVE-2024-46679, CVE-2024-41076, CVE-2024-46784, CVE-2024-46786, CVE-2024-46678, CVE-2024-44957, CVE-2024-46755, CVE-2024-47660, CVE-2024-41067, CVE-2024-46838, CVE-2024-43879, CVE-2024-45007, CVE-2024-45025, CVE-2024-45001, CVE-2024-41009, CVE-2024-41051, CVE-2024-46836, CVE-2024-49984, CVE-2024-45028, CVE-2024-43871, CVE-2024-46783, CVE-2024-42272, CVE-2024-42087, CVE-2024-46785, CVE-2024-42276, CVE-2024-47658, CVE-2024-46761, CVE-2024-46715, CVE-2024-46676, CVE-2024-43824, CVE-2024-42100, CVE-2024-46745, CVE-2024-41084, CVE-2024-41086, CVE-2024-45015, CVE-2024-46797, CVE-2024-42160, CVE-2024-46706, CVE-2024-46803, CVE-2024-46708, CVE-2024-47669, CVE-2024-45009, CVE-2024-41021, CVE-2024-42159, CVE-2024-42321, CVE-2024-46868, CVE-2024-41078, CVE-2024-42303, CVE-2024-45027, CVE-2024-42309, CVE-2024-43849, CVE-2024-43907, CVE-2024-43899, CVE-2024-43823, CVE-2024-42232, CVE-2024-44937, CVE-2024-41046, CVE-2024-42237, CVE-2024-42063, CVE-2024-42065, CVE-2024-42154, CVE-2024-42259, CVE-2024-46698, CVE-2024-46741, CVE-2024-45020, CVE-2024-42151, CVE-2024-41073, CVE-2024-46719, CVE-2024-42295, CVE-2024-46859, CVE-2024-41035, CVE-2024-46751, CVE-2024-47667, CVE-2024-46728, CVE-2024-46824, CVE-2024-42121, CVE-2024-46776, CVE-2024-46768, CVE-2024-43908, CVE-2024-43900, CVE-2024-46707, CVE-2024-44934, CVE-2024-41062, CVE-2024-42304, CVE-2024-42312, CVE-2024-42157, CVE-2024-41092, CVE-2024-41041, CVE-2024-43832, CVE-2024-41039, CVE-2024-44962, CVE-2024-46858, CVE-2024-43856, CVE-2024-41060, CVE-2024-45010, CVE-2024-41044, CVE-2024-44942, CVE-2024-42307, CVE-2024-44984, CVE-2024-41075, CVE-2024-43817, CVE-2024-46791, CVE-2024-46853, CVE-2024-42301, CVE-2024-44993, CVE-2024-41094, CVE-2024-27022, CVE-2024-41088, CVE-2024-43883, CVE-2024-41087, CVE-2024-46780, CVE-2024-42070, CVE-2024-44965, CVE-2024-46823, CVE-2024-46737, CVE-2024-44982, CVE-2024-46697, CVE-2024-45021, CVE-2024-44987, CVE-2024-41072, CVE-2024-41063, CVE-2024-46757, CVE-2024-46831, CVE-2024-44966, CVE-2024-42322, CVE-2024-42231, CVE-2024-46717, CVE-2024-41065, CVE-2024-44969, CVE-2023-52887, CVE-2024-42105, CVE-2024-44971, CVE-2024-46798, CVE-2024-42262, CVE-2024-44938, CVE-2024-42088, CVE-2024-44970, CVE-2024-43876, CVE-2024-46800, CVE-2024-42086, CVE-2024-43826, CVE-2024-46729, CVE-2024-46747, CVE-2024-46691, CVE-2024-46723, CVE-2024-41018, CVE-2024-42258, CVE-2024-41081, CVE-2024-41049, CVE-2024-43837, CVE-2024-45008, CVE-2024-41047, CVE-2024-41019, CVE-2024-42152, CVE-2024-41090, CVE-2024-46716, CVE-2024-42104, CVE-2024-46804, CVE-2024-43852, CVE-2024-42129, CVE-2024-46870, CVE-2024-41093, CVE-2024-45011, CVE-2024-41064, CVE-2024-46722, CVE-2024-42286, CVE-2024-45026, CVE-2024-46818, CVE-2024-42281, CVE-2024-43854, CVE-2024-41037, CVE-2024-44946, CVE-2024-41012, CVE-2024-41098, CVE-2024-42263, CVE-2024-42095, CVE-2024-46756, CVE-2024-43913, CVE-2024-46822, CVE-2024-44944, CVE-2024-42156, CVE-2024-42073, CVE-2024-42093, CVE-2024-44931, CVE-2024-42223, CVE-2024-42264, CVE-2024-42278, CVE-2024-46759, CVE-2024-46826, CVE-2024-43828, CVE-2024-42318, CVE-2024-42240, CVE-2024-45000, CVE-2024-43909, CVE-2024-46792, CVE-2024-42109, CVE-2024-43867, CVE-2024-42130, CVE-2024-42244, CVE-2024-44977, CVE-2024-46774, CVE-2024-41030, CVE-2024-42310, CVE-2024-42138, CVE-2024-42317, CVE-2024-42224, CVE-2024-46694, CVE-2024-46815, CVE-2024-46677, CVE-2024-46763, CVE-2024-46860, CVE-2024-46767, CVE-2024-42111, CVE-2024-41020, CVE-2024-46726, CVE-2024-42117, CVE-2024-43831, CVE-2024-42285, CVE-2024-46842, CVE-2024-43857, CVE-2024-41031, CVE-2024-43834, CVE-2024-42135, CVE-2024-42241, CVE-2024-46846, CVE-2024-44988, CVE-2024-43892, CVE-2024-44991, CVE-2024-46806, CVE-2024-41015, CVE-2024-43906, CVE-2024-42238, CVE-2024-46779, CVE-2024-41010, CVE-2024-41068, CVE-2024-46730, CVE-2024-46827, CVE-2024-42120, CVE-2024-41059, CVE-2024-46850, CVE-2023-52889, CVE-2024-45017, CVE-2024-45003, CVE-2024-46844, CVE-2024-46816, CVE-2024-46811, CVE-2024-41023, CVE-2024-44948, CVE-2024-46753, CVE-2024-45002, CVE-2024-42251, CVE-2024-46713, CVE-2024-42273, CVE-2024-46733, CVE-2024-46739, CVE-2024-42108, CVE-2024-41085, CVE-2024-41033, CVE-2024-42298, CVE-2024-46835, CVE-2024-39472, CVE-2024-47663, CVE-2024-43859, CVE-2024-43820, CVE-2024-42118, CVE-2024-41036, CVE-2024-47683, CVE-2024-42161, CVE-2024-42235, CVE-2024-43861, CVE-2024-43863, CVE-2024-47668, CVE-2024-46685, CVE-2024-43864, CVE-2024-46749, CVE-2024-44983, CVE-2024-46841, CVE-2024-42082, CVE-2024-43818, CVE-2024-41071, CVE-2024-45006, CVE-2024-42080, CVE-2024-46825, CVE-2024-46687, CVE-2024-44959, CVE-2024-43835, CVE-2024-43891, CVE-2024-46851, CVE-2024-42248, CVE-2024-42103, CVE-2024-42079, CVE-2024-42068, CVE-2024-47664, CVE-2024-46854, CVE-2024-44973, CVE-2024-42077, CVE-2024-46821, CVE-2024-43886, CVE-2024-41089, CVE-2024-43850, CVE-2024-44995, CVE-2024-46809, CVE-2024-42084, CVE-2024-46758, CVE-2024-47662, CVE-2024-43839, CVE-2024-46738, CVE-2024-41034, CVE-2024-42228, CVE-2024-42147, CVE-2024-43855, CVE-2024-41032, CVE-2024-46819, CVE-2024-44989, CVE-2024-42265, CVE-2024-42110, CVE-2024-42155, CVE-2024-45005, CVE-2024-45016, CVE-2024-42141, CVE-2024-43821, CVE-2024-42299, CVE-2024-44950, CVE-2024-42279, CVE-2024-44943, CVE-2024-43904, CVE-2024-42268, CVE-2024-42089, CVE-2024-46807, CVE-2024-44996, CVE-2024-42069, CVE-2024-46672, CVE-2024-44940, CVE-2024-42270, CVE-2024-46735, CVE-2024-42319, CVE-2024-46754, CVE-2024-46861, CVE-2024-42277, CVE-2024-41054, CVE-2024-42131, CVE-2024-41056, CVE-2024-44963, CVE-2024-42267, CVE-2024-42283, CVE-2024-42320, CVE-2024-46740, CVE-2024-46787, CVE-2024-43895, CVE-2024-43881, CVE-2024-44961, CVE-2024-43910, CVE-2024-43875, CVE-2024-42289, CVE-2024-43853, CVE-2024-42315, CVE-2024-43884, CVE-2024-46867, CVE-2024-43912, CVE-2024-41007, CVE-2024-46743, CVE-2024-46675, CVE-2024-43877, CVE-2024-39486, CVE-2024-41050, CVE-2024-43858, CVE-2024-45018, CVE-2024-46744, CVE-2024-46750, CVE-2024-46840, CVE-2024-42150, CVE-2024-41028, CVE-2024-42091, CVE-2024-43894, CVE-2024-43869, CVE-2024-42132, CVE-2024-46777, CVE-2024-42106, CVE-2024-46848, CVE-2024-41038, CVE-2024-46711, CVE-2024-43833, CVE-2024-46710, CVE-2024-46812, CVE-2024-42311, CVE-2024-46701, CVE-2024-46683, CVE-2024-45029, CVE-2024-46830, CVE-2024-46857, CVE-2024-44979, CVE-2024-44999, CVE-2024-44985, CVE-2024-46773, CVE-2024-45022, CVE-2024-46772, CVE-2024-44960, CVE-2024-42243, CVE-2024-42158, CVE-2024-43819, CVE-2024-45030, CVE-2024-42085, CVE-2024-42274, CVE-2024-44986, CVE-2024-41048, CVE-2024-42098, CVE-2024-46680, CVE-2023-52918, CVE-2024-46673, CVE-2024-46834, CVE-2024-42288, CVE-2024-44998, CVE-2024-42113, CVE-2024-42094, CVE-2024-42225, CVE-2024-42112, CVE-2024-42153, CVE-2024-43880, CVE-2024-43905, CVE-2024-43902, CVE-2024-46681, CVE-2024-42236, CVE-2024-42294, CVE-2024-46793, CVE-2024-43882, CVE-2024-44947, CVE-2024-46849, CVE-2024-44954, CVE-2024-46852, CVE-2024-41070, CVE-2024-41069, CVE-2024-46864, CVE-2024-46703, CVE-2024-43829, CVE-2024-46802, CVE-2024-42101, CVE-2024-44990, CVE-2024-43830, CVE-2024-41029, CVE-2024-43866, CVE-2024-43889, CVE-2024-42230, CVE-2024-46692, CVE-2024-42133, CVE-2024-45013, CVE-2024-42076, CVE-2024-46810, CVE-2024-42128, CVE-2024-46718, CVE-2024-46814, CVE-2024-43841, CVE-2024-43873, CVE-2024-42092, CVE-2024-41074, CVE-2024-41083, CVE-2024-46731, CVE-2024-43842, CVE-2024-41077, CVE-2024-46720, CVE-2024-46795, CVE-2024-46813, CVE-2024-46805, CVE-2024-42142, CVE-2024-42291, CVE-2024-43846, CVE-2024-41057, CVE-2024-43870, CVE-2024-44980, CVE-2024-46866, CVE-2024-43827, CVE-2024-43840, CVE-2024-42280, CVE-2024-42261, CVE-2024-42246, CVE-2024-42115, CVE-2024-46686, CVE-2024-43860, CVE-2024-46808, CVE-2024-42149, CVE-2024-46828, CVE-2024-44935, CVE-2024-43847, CVE-2024-44967, CVE-2024-46817, CVE-2024-46721, CVE-2024-42305, CVE-2024-46766, CVE-2024-43914, CVE-2024-46760, CVE-2024-41061, CVE-2024-41091, CVE-2024-43890, CVE-2024-42314, CVE-2024-42064, CVE-2024-42302, CVE-2024-43887, CVE-2024-46832, CVE-2024-46765, CVE-2024-46770, CVE-2024-41080, CVE-2024-42253, CVE-2024-44941, CVE-2024-42306, CVE-2024-41027, CVE-2024-46689, CVE-2024-46781, CVE-2024-42247, CVE-2024-41066, CVE-2024-42287, CVE-2024-41097, CVE-2024-44939, CVE-2024-45019, CVE-2024-47674, CVE-2024-46705, CVE-2024-42119, CVE-2024-46725, CVE-2024-46746, CVE-2024-46732, CVE-2024-41042, CVE-2024-44958, CVE-2024-42114, CVE-2024-43893, CVE-2024-47666, CVE-2024-46843, CVE-2024-42252, CVE-2024-42102, CVE-2024-42136, CVE-2024-41045, CVE-2024-42260, CVE-2024-46771, CVE-2024-42124, CVE-2024-42297, CVE-2024-42271, CVE-2024-43845, CVE-2024-46775, CVE-2024-41079, CVE-2024-43868, CVE-2024-42140, CVE-2024-42313, CVE-2024-42145, CVE-2024-46724, CVE-2024-46788, CVE-2024-42234, CVE-2024-42144, CVE-2024-44974, CVE-2024-42097, CVE-2024-46714, CVE-2024-41055, CVE-2024-44956) Update Instructions: Run `sudo pro fix USN-7156-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-cloud-tools-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-cloud-tools-gkeop - 6.8.0-1002.4 linux-cloud-tools-gkeop-6.8 - 6.8.0-1002.4 linux-gkeop - 6.8.0-1002.4 linux-gkeop-6.8 - 6.8.0-1002.4 linux-gkeop-cloud-tools-6.8.0-1002 - 6.8.0-1002.4 linux-gkeop-headers-6.8.0-1002 - 6.8.0-1002.4 linux-gkeop-tools-6.8.0-1002 - 6.8.0-1002.4 linux-headers-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-headers-gkeop - 6.8.0-1002.4 linux-headers-gkeop-6.8 - 6.8.0-1002.4 linux-image-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-image-gkeop - 6.8.0-1002.4 linux-image-gkeop-6.8 - 6.8.0-1002.4 linux-image-unsigned-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-extra-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-extra-gkeop - 6.8.0-1002.4 linux-modules-extra-gkeop-6.8 - 6.8.0-1002.4 linux-tools-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-tools-gkeop - 6.8.0-1002.4 linux-tools-gkeop-6.8 - 6.8.0-1002.4 No subscription required
High
CVE-2023-52887
CVE-2023-52888
CVE-2023-52889
CVE-2023-52918
CVE-2024-25741
CVE-2024-27022
CVE-2024-39472
CVE-2024-39486
CVE-2024-39487
CVE-2024-41007
CVE-2024-41009
CVE-2024-41010
CVE-2024-41012
CVE-2024-41015
CVE-2024-41017
CVE-2024-41018
CVE-2024-41019
CVE-2024-41020
CVE-2024-41021
CVE-2024-41022
CVE-2024-41023
CVE-2024-41025
CVE-2024-41027
CVE-2024-41028
CVE-2024-41029
CVE-2024-41030
CVE-2024-41031
CVE-2024-41032
CVE-2024-41033
CVE-2024-41034
CVE-2024-41035
CVE-2024-41036
CVE-2024-41037
CVE-2024-41038
CVE-2024-41039
CVE-2024-41041
CVE-2024-41042
CVE-2024-41044
CVE-2024-41045
CVE-2024-41046
CVE-2024-41047
CVE-2024-41048
CVE-2024-41049
CVE-2024-41050
CVE-2024-41051
CVE-2024-41052
CVE-2024-41053
CVE-2024-41054
CVE-2024-41055
CVE-2024-41056
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41060
CVE-2024-41061
CVE-2024-41062
CVE-2024-41063
CVE-2024-41064
CVE-2024-41065
CVE-2024-41066
CVE-2024-41067
CVE-2024-41068
CVE-2024-41069
CVE-2024-41070
CVE-2024-41072
CVE-2024-41073
CVE-2024-41074
CVE-2024-41075
CVE-2024-41076
CVE-2024-41077
CVE-2024-41078
CVE-2024-41079
CVE-2024-41080
CVE-2024-41081
CVE-2024-41082
CVE-2024-41083
CVE-2024-41084
CVE-2024-41085
CVE-2024-41086
CVE-2024-41087
CVE-2024-41088
CVE-2024-41089
CVE-2024-41090
CVE-2024-41091
CVE-2024-41092
CVE-2024-41093
CVE-2024-41094
CVE-2024-41095
CVE-2024-41096
CVE-2024-41097
CVE-2024-41098
CVE-2024-42063
CVE-2024-42064
CVE-2024-42065
CVE-2024-42066
CVE-2024-42067
CVE-2024-42068
CVE-2024-42069
CVE-2024-42070
CVE-2024-42073
CVE-2024-42074
CVE-2024-42076
CVE-2024-42077
CVE-2024-42079
CVE-2024-42080
CVE-2024-42082
CVE-2024-42084
CVE-2024-42085
CVE-2024-42086
CVE-2024-42087
CVE-2024-42088
CVE-2024-42089
CVE-2024-42090
CVE-2024-42091
CVE-2024-42092
CVE-2024-42093
CVE-2024-42094
CVE-2024-42095
CVE-2024-42096
CVE-2024-42097
CVE-2024-42098
CVE-2024-42100
CVE-2024-42101
CVE-2024-42102
CVE-2024-42103
CVE-2024-42104
CVE-2024-42105
CVE-2024-42106
CVE-2024-42108
CVE-2024-42109
CVE-2024-42110
CVE-2024-42111
CVE-2024-42112
CVE-2024-42113
CVE-2024-42114
CVE-2024-42115
CVE-2024-42117
CVE-2024-42118
CVE-2024-42119
CVE-2024-42120
CVE-2024-42121
CVE-2024-42124
CVE-2024-42126
CVE-2024-42127
CVE-2024-42128
CVE-2024-42129
CVE-2024-42130
CVE-2024-42131
CVE-2024-42132
CVE-2024-42133
CVE-2024-42135
CVE-2024-42136
CVE-2024-42137
CVE-2024-42138
CVE-2024-42140
CVE-2024-42141
CVE-2024-42142
CVE-2024-42144
CVE-2024-42145
CVE-2024-42146
CVE-2024-42147
CVE-2024-42149
CVE-2024-42150
CVE-2024-42151
CVE-2024-42152
CVE-2024-42153
CVE-2024-42154
CVE-2024-42155
CVE-2024-42156
CVE-2024-42157
CVE-2024-42158
CVE-2024-42159
CVE-2024-42160
CVE-2024-42161
CVE-2024-42223
CVE-2024-42224
CVE-2024-42225
CVE-2024-42227
CVE-2024-42228
CVE-2024-42229
CVE-2024-42230
CVE-2024-42231
CVE-2024-42232
CVE-2024-42234
CVE-2024-42235
CVE-2024-42236
CVE-2024-42237
CVE-2024-42238
CVE-2024-42239
CVE-2024-42240
CVE-2024-42241
CVE-2024-42243
CVE-2024-42244
CVE-2024-42245
CVE-2024-42246
CVE-2024-42247
CVE-2024-42248
CVE-2024-42250
CVE-2024-42251
CVE-2024-42252
CVE-2024-42253
CVE-2024-42258
CVE-2024-42259
CVE-2024-42260
CVE-2024-42261
CVE-2024-42262
CVE-2024-42263
CVE-2024-42264
CVE-2024-42265
CVE-2024-42267
CVE-2024-42268
CVE-2024-42269
CVE-2024-42270
CVE-2024-42271
CVE-2024-42272
CVE-2024-42273
CVE-2024-42274
CVE-2024-42276
CVE-2024-42277
CVE-2024-42278
CVE-2024-42279
CVE-2024-42280
CVE-2024-42281
CVE-2024-42283
CVE-2024-42284
CVE-2024-42285
CVE-2024-42286
CVE-2024-42287
CVE-2024-42288
CVE-2024-42289
CVE-2024-42290
CVE-2024-42291
CVE-2024-42292
CVE-2024-42294
CVE-2024-42295
CVE-2024-42296
CVE-2024-42297
CVE-2024-42298
CVE-2024-42299
CVE-2024-42301
CVE-2024-42302
CVE-2024-42303
CVE-2024-42304
CVE-2024-42305
CVE-2024-42306
CVE-2024-42307
CVE-2024-42309
CVE-2024-42310
CVE-2024-42311
CVE-2024-42312
CVE-2024-42313
CVE-2024-42314
CVE-2024-42315
CVE-2024-42316
CVE-2024-42317
CVE-2024-42318
CVE-2024-42319
CVE-2024-42320
CVE-2024-42321
CVE-2024-42322
CVE-2024-43817
CVE-2024-43818
CVE-2024-43819
CVE-2024-43820
CVE-2024-43821
CVE-2024-43823
CVE-2024-43824
CVE-2024-43825
CVE-2024-43826
CVE-2024-43827
CVE-2024-43828
CVE-2024-43829
CVE-2024-43830
CVE-2024-43831
CVE-2024-43832
CVE-2024-43833
CVE-2024-43834
CVE-2024-43835
CVE-2024-43837
CVE-2024-43839
CVE-2024-43840
CVE-2024-43841
CVE-2024-43842
CVE-2024-43843
CVE-2024-43845
CVE-2024-43846
CVE-2024-43847
CVE-2024-43849
CVE-2024-43850
CVE-2024-43852
CVE-2024-43853
CVE-2024-43854
CVE-2024-43855
CVE-2024-43856
CVE-2024-43857
CVE-2024-43858
CVE-2024-43859
CVE-2024-43860
CVE-2024-43861
CVE-2024-43863
CVE-2024-43864
CVE-2024-43866
CVE-2024-43867
CVE-2024-43868
CVE-2024-43869
CVE-2024-43870
CVE-2024-43871
CVE-2024-43873
CVE-2024-43875
CVE-2024-43876
CVE-2024-43877
CVE-2024-43879
CVE-2024-43880
CVE-2024-43881
CVE-2024-43882
CVE-2024-43883
CVE-2024-43884
CVE-2024-43886
CVE-2024-43887
CVE-2024-43888
CVE-2024-43889
CVE-2024-43890
CVE-2024-43891
CVE-2024-43892
CVE-2024-43893
CVE-2024-43894
CVE-2024-43895
CVE-2024-43899
CVE-2024-43900
CVE-2024-43902
CVE-2024-43904
CVE-2024-43905
CVE-2024-43906
CVE-2024-43907
CVE-2024-43908
CVE-2024-43909
CVE-2024-43910
CVE-2024-43911
CVE-2024-43912
CVE-2024-43913
CVE-2024-43914
CVE-2024-44931
CVE-2024-44934
CVE-2024-44935
CVE-2024-44937
CVE-2024-44938
CVE-2024-44939
CVE-2024-44940
CVE-2024-44941
CVE-2024-44942
CVE-2024-44943
CVE-2024-44944
CVE-2024-44946
CVE-2024-44947
CVE-2024-44948
CVE-2024-44950
CVE-2024-44953
CVE-2024-44954
CVE-2024-44956
CVE-2024-44957
CVE-2024-44958
CVE-2024-44959
CVE-2024-44960
CVE-2024-44961
CVE-2024-44962
CVE-2024-44963
CVE-2024-44965
CVE-2024-44966
CVE-2024-44967
CVE-2024-44969
CVE-2024-44970
CVE-2024-44971
CVE-2024-44972
CVE-2024-44973
CVE-2024-44974
CVE-2024-44975
CVE-2024-44977
CVE-2024-44978
CVE-2024-44979
CVE-2024-44980
CVE-2024-44982
CVE-2024-44983
CVE-2024-44984
CVE-2024-44985
CVE-2024-44986
CVE-2024-44987
CVE-2024-44988
CVE-2024-44989
CVE-2024-44990
CVE-2024-44991
CVE-2024-44993
CVE-2024-44995
CVE-2024-44996
CVE-2024-44998
CVE-2024-44999
CVE-2024-45000
CVE-2024-45001
CVE-2024-45002
CVE-2024-45003
CVE-2024-45005
CVE-2024-45006
CVE-2024-45007
CVE-2024-45008
CVE-2024-45009
CVE-2024-45010
CVE-2024-45011
CVE-2024-45012
CVE-2024-45013
CVE-2024-45015
CVE-2024-45016
CVE-2024-45017
CVE-2024-45018
CVE-2024-45019
CVE-2024-45020
CVE-2024-45021
CVE-2024-45022
CVE-2024-45025
CVE-2024-45026
CVE-2024-45027
CVE-2024-45028
CVE-2024-45029
CVE-2024-45030
CVE-2024-46672
CVE-2024-46673
CVE-2024-46675
CVE-2024-46676
CVE-2024-46677
CVE-2024-46678
CVE-2024-46679
CVE-2024-46680
CVE-2024-46681
CVE-2024-46683
CVE-2024-46685
CVE-2024-46686
CVE-2024-46687
CVE-2024-46689
CVE-2024-46691
CVE-2024-46692
CVE-2024-46693
CVE-2024-46694
CVE-2024-46695
CVE-2024-46697
CVE-2024-46698
CVE-2024-46701
CVE-2024-46702
CVE-2024-46703
CVE-2024-46705
CVE-2024-46706
CVE-2024-46707
CVE-2024-46708
CVE-2024-46709
CVE-2024-46710
CVE-2024-46711
CVE-2024-46713
CVE-2024-46714
CVE-2024-46715
CVE-2024-46716
CVE-2024-46717
CVE-2024-46718
CVE-2024-46719
CVE-2024-46720
CVE-2024-46721
CVE-2024-46722
CVE-2024-46723
CVE-2024-46724
CVE-2024-46725
CVE-2024-46726
CVE-2024-46727
CVE-2024-46728
CVE-2024-46729
CVE-2024-46730
CVE-2024-46731
CVE-2024-46732
CVE-2024-46733
CVE-2024-46735
CVE-2024-46737
CVE-2024-46738
CVE-2024-46739
CVE-2024-46740
CVE-2024-46741
CVE-2024-46743
CVE-2024-46744
CVE-2024-46745
CVE-2024-46746
CVE-2024-46747
CVE-2024-46749
CVE-2024-46750
CVE-2024-46751
CVE-2024-46752
CVE-2024-46753
CVE-2024-46754
CVE-2024-46755
CVE-2024-46759
CVE-2024-46760
CVE-2024-46761
CVE-2024-46762
CVE-2024-46763
CVE-2024-46765
CVE-2024-46766
CVE-2024-46767
CVE-2024-46768
CVE-2024-46770
CVE-2024-46771
CVE-2024-46772
CVE-2024-46773
CVE-2024-46774
CVE-2024-46775
CVE-2024-46776
CVE-2024-46777
CVE-2024-46778
CVE-2024-46779
CVE-2024-46780
CVE-2024-46781
CVE-2024-46782
CVE-2024-46783
CVE-2024-46784
CVE-2024-46785
CVE-2024-46786
CVE-2024-46787
CVE-2024-46788
CVE-2024-46791
CVE-2024-46792
CVE-2024-46793
CVE-2024-46794
CVE-2024-46795
CVE-2024-46797
CVE-2024-46798
CVE-2024-46800
CVE-2024-46802
CVE-2024-46803
CVE-2024-46804
CVE-2024-46805
CVE-2024-46806
CVE-2024-46807
CVE-2024-46808
CVE-2024-46809
CVE-2024-46810
CVE-2024-46811
CVE-2024-46812
CVE-2024-46813
CVE-2024-46814
CVE-2024-46815
CVE-2024-46816
CVE-2024-46817
CVE-2024-46818
CVE-2024-46819
CVE-2024-46821
CVE-2024-46822
CVE-2024-46823
CVE-2024-46824
CVE-2024-46825
CVE-2024-46826
CVE-2024-46827
CVE-2024-46828
CVE-2024-46829
CVE-2024-46830
CVE-2024-46831
CVE-2024-46832
CVE-2024-46834
CVE-2024-46835
CVE-2024-46836
CVE-2024-46838
CVE-2024-46840
CVE-2024-46841
CVE-2024-46842
CVE-2024-46843
CVE-2024-46844
CVE-2024-46845
CVE-2024-46846
CVE-2024-46848
CVE-2024-46849
CVE-2024-46850
CVE-2024-46851
CVE-2024-46852
CVE-2024-46853
CVE-2024-46854
CVE-2024-46855
CVE-2024-46857
CVE-2024-46858
CVE-2024-46859
CVE-2024-46860
CVE-2024-46861
CVE-2024-46864
CVE-2024-46866
CVE-2024-46867
CVE-2024-46868
CVE-2024-46870
CVE-2024-46871
CVE-2024-47658
CVE-2024-47659
CVE-2024-47660
CVE-2024-47661
CVE-2024-47662
CVE-2024-47663
CVE-2024-47664
CVE-2024-47665
CVE-2024-47666
CVE-2024-47667
CVE-2024-47668
CVE-2024-47669
CVE-2024-47674
CVE-2024-47683
CVE-2024-49984
USN-7157-1 -- PHP vulnerabilities
Ubuntu 24.04 LTS
It was discovered that PHP incorrectly handled certain inputs when processed with convert.quoted-printable decode filters. An attacker could possibly use this issue to expose sensitive information or cause a crash. (CVE-2024-11233) It was discovered that PHP incorrectly handled certain HTTP requests. An attacker could possibly use this issue to performing arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user. (CVE-2024-11234) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2024-11236, CVE-2024-8932) It was discovered that PHP incorrectly handled certain MySQL requests. An attacker could possibly use this issue to cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server. (CVE-2024-8929) Update Instructions: Run `sudo pro fix USN-7157-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.3 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.3 php8.3 - 8.3.6-0ubuntu0.24.04.3 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.3 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.3 php8.3-cgi - 8.3.6-0ubuntu0.24.04.3 php8.3-cli - 8.3.6-0ubuntu0.24.04.3 php8.3-common - 8.3.6-0ubuntu0.24.04.3 php8.3-curl - 8.3.6-0ubuntu0.24.04.3 php8.3-dba - 8.3.6-0ubuntu0.24.04.3 php8.3-dev - 8.3.6-0ubuntu0.24.04.3 php8.3-enchant - 8.3.6-0ubuntu0.24.04.3 php8.3-fpm - 8.3.6-0ubuntu0.24.04.3 php8.3-gd - 8.3.6-0ubuntu0.24.04.3 php8.3-gmp - 8.3.6-0ubuntu0.24.04.3 php8.3-imap - 8.3.6-0ubuntu0.24.04.3 php8.3-interbase - 8.3.6-0ubuntu0.24.04.3 php8.3-intl - 8.3.6-0ubuntu0.24.04.3 php8.3-ldap - 8.3.6-0ubuntu0.24.04.3 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.3 php8.3-mysql - 8.3.6-0ubuntu0.24.04.3 php8.3-odbc - 8.3.6-0ubuntu0.24.04.3 php8.3-opcache - 8.3.6-0ubuntu0.24.04.3 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.3 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.3 php8.3-pspell - 8.3.6-0ubuntu0.24.04.3 php8.3-readline - 8.3.6-0ubuntu0.24.04.3 php8.3-snmp - 8.3.6-0ubuntu0.24.04.3 php8.3-soap - 8.3.6-0ubuntu0.24.04.3 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.3 php8.3-sybase - 8.3.6-0ubuntu0.24.04.3 php8.3-tidy - 8.3.6-0ubuntu0.24.04.3 php8.3-xml - 8.3.6-0ubuntu0.24.04.3 php8.3-xsl - 8.3.6-0ubuntu0.24.04.3 php8.3-zip - 8.3.6-0ubuntu0.24.04.3 No subscription required
Medium
CVE-2024-11233
CVE-2024-11234
CVE-2024-11236
CVE-2024-8929
CVE-2024-8932
USN-7158-1 -- Smarty vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Smarty incorrectly handled query parameters in requests. An attacker could possibly use this issue to inject arbitrary Javascript code, resulting in denial of service or potential execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2018-25047, CVE-2023-28447) It was discovered that Smarty did not properly sanitize user input when generating templates. An attacker could, through PHP injection, possibly use this issue to execute arbitrary code. (CVE-2024-35226) Update Instructions: Run `sudo pro fix USN-7158-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smarty3 - 3.1.48-1ubuntu0.24.04.1 No subscription required
High
CVE-2018-25047
CVE-2023-28447
CVE-2024-35226
USN-7161-1 -- Docker vulnerabilities
Ubuntu 24.04 LTS
Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed for the source package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. This issue was only addressed for the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110) Update Instructions: Run `sudo pro fix USN-7161-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: docker-doc - 26.1.3-0ubuntu1~24.04.1+esm1 docker.io - 26.1.3-0ubuntu1~24.04.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-29018
CVE-2024-41110
USN-7161-3 -- Docker vulnerability
Ubuntu 24.04 LTS
USN-7161-1 and USN-7161-2 fixed CVE-2024-41110 for source package docker.io in Ubuntu 18.04 LTS and for source package docker.io-app in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. This update fixes it for source package docker.io in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. These updates only address the docker library and not the docker.io application itself, which was already patched in the previous USNs (USN-7161-1 and USN-7161-2). Original advisory details: Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed for the source package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. This issue was only addressed for the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110) Update Instructions: Run `sudo pro fix USN-7161-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-docker-docker-dev - 20.10.25+dfsg1-2ubuntu1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-41110
USN-7162-1 -- curl vulnerability
Ubuntu 24.04 LTS
Harry Sintonen discovered that curl incorrectly handled credentials from .netrc files when following HTTP redirects. In certain configurations, the password for the first host could be leaked to the followed-to host, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7162-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.6 libcurl3t64-gnutls - 8.5.0-2ubuntu10.6 libcurl4-doc - 8.5.0-2ubuntu10.6 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.6 libcurl4-openssl-dev - 8.5.0-2ubuntu10.6 libcurl4t64 - 8.5.0-2ubuntu10.6 No subscription required
Low
CVE-2024-11053
USN-7165-1 -- Spring Framework vulnerability
Ubuntu 24.04 LTS
It was discovered that the Spring Framework incorrectly handled web requests via data binding. An attacker could possibly use this issue to achieve remote code execution and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7165-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libspring-aop-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-beans-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-context-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-context-support-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-core-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-expression-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-instrument-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-jdbc-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-jms-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-messaging-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-orm-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-oxm-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-test-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-transaction-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-portlet-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-servlet-java - 4.3.30-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2022-22965
USN-7167-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-50264, CVE-2024-49967, CVE-2024-53057) Update Instructions: Run `sudo pro fix USN-7167-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-cloud-tools-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-cloud-tools-gkeop - 6.8.0-1003.5 linux-cloud-tools-gkeop-6.8 - 6.8.0-1003.5 linux-gkeop - 6.8.0-1003.5 linux-gkeop-6.8 - 6.8.0-1003.5 linux-gkeop-cloud-tools-6.8.0-1003 - 6.8.0-1003.5 linux-gkeop-headers-6.8.0-1003 - 6.8.0-1003.5 linux-gkeop-tools-6.8.0-1003 - 6.8.0-1003.5 linux-headers-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-headers-gkeop - 6.8.0-1003.5 linux-headers-gkeop-6.8 - 6.8.0-1003.5 linux-image-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-image-gkeop - 6.8.0-1003.5 linux-image-gkeop-6.8 - 6.8.0-1003.5 linux-image-unsigned-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-extra-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-extra-gkeop - 6.8.0-1003.5 linux-modules-extra-gkeop-6.8 - 6.8.0-1003.5 linux-tools-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-tools-gkeop - 6.8.0-1003.5 linux-tools-gkeop-6.8 - 6.8.0-1003.5 No subscription required linux-buildinfo-6.8.0-1016-gke - 6.8.0-1016.20 linux-gke - 6.8.0-1016.20 linux-gke-headers-6.8.0-1016 - 6.8.0-1016.20 linux-gke-tools-6.8.0-1016 - 6.8.0-1016.20 linux-headers-6.8.0-1016-gke - 6.8.0-1016.20 linux-headers-gke - 6.8.0-1016.20 linux-image-6.8.0-1016-gke - 6.8.0-1016.20 linux-image-gke - 6.8.0-1016.20 linux-image-unsigned-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-extra-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-iwlwifi-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-iwlwifi-gke - 6.8.0-1016.20 linux-tools-6.8.0-1016-gke - 6.8.0-1016.20 linux-tools-gke - 6.8.0-1016.20 No subscription required linux-buildinfo-6.8.0-1017-raspi - 6.8.0-1017.19 linux-headers-6.8.0-1017-raspi - 6.8.0-1017.19 linux-headers-raspi - 6.8.0-1017.19 linux-image-6.8.0-1017-raspi - 6.8.0-1017.19 linux-image-raspi - 6.8.0-1017.19 linux-modules-6.8.0-1017-raspi - 6.8.0-1017.19 linux-raspi - 6.8.0-1017.19 linux-raspi-headers-6.8.0-1017 - 6.8.0-1017.19 linux-raspi-tools-6.8.0-1017 - 6.8.0-1017.19 linux-tools-6.8.0-1017-raspi - 6.8.0-1017.19 linux-tools-raspi - 6.8.0-1017.19 No subscription required linux-buildinfo-6.8.0-1018-ibm - 6.8.0-1018.18 linux-headers-6.8.0-1018-ibm - 6.8.0-1018.18 linux-headers-ibm - 6.8.0-1018.18 linux-headers-ibm-classic - 6.8.0-1018.18 linux-headers-ibm-lts-24.04 - 6.8.0-1018.18 linux-ibm - 6.8.0-1018.18 linux-ibm-classic - 6.8.0-1018.18 linux-ibm-cloud-tools-common - 6.8.0-1018.18 linux-ibm-headers-6.8.0-1018 - 6.8.0-1018.18 linux-ibm-lts-24.04 - 6.8.0-1018.18 linux-ibm-source-6.8.0 - 6.8.0-1018.18 linux-ibm-tools-6.8.0-1018 - 6.8.0-1018.18 linux-image-6.8.0-1018-ibm - 6.8.0-1018.18 linux-image-ibm - 6.8.0-1018.18 linux-image-ibm-classic - 6.8.0-1018.18 linux-image-ibm-lts-24.04 - 6.8.0-1018.18 linux-image-unsigned-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-extra-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-ibm-classic - 6.8.0-1018.18 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1018.18 linux-tools-6.8.0-1018-ibm - 6.8.0-1018.18 linux-tools-ibm - 6.8.0-1018.18 linux-tools-ibm-classic - 6.8.0-1018.18 linux-tools-ibm-lts-24.04 - 6.8.0-1018.18 No subscription required linux-buildinfo-6.8.0-1018-oracle - 6.8.0-1018.19 linux-buildinfo-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-headers-6.8.0-1018-oracle - 6.8.0-1018.19 linux-headers-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-headers-oracle - 6.8.0-1018.19 linux-headers-oracle-64k - 6.8.0-1018.19 linux-image-6.8.0-1018-oracle - 6.8.0-1018.19 linux-image-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-image-oracle - 6.8.0-1018.19 linux-image-oracle-64k - 6.8.0-1018.19 linux-image-unsigned-6.8.0-1018-oracle - 6.8.0-1018.19 linux-image-unsigned-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-modules-6.8.0-1018-oracle - 6.8.0-1018.19 linux-modules-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-modules-extra-6.8.0-1018-oracle - 6.8.0-1018.19 linux-modules-extra-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-oracle - 6.8.0-1018.19 linux-oracle-64k - 6.8.0-1018.19 linux-oracle-headers-6.8.0-1018 - 6.8.0-1018.19 linux-oracle-tools-6.8.0-1018 - 6.8.0-1018.19 linux-tools-6.8.0-1018-oracle - 6.8.0-1018.19 linux-tools-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-tools-oracle - 6.8.0-1018.19 linux-tools-oracle-64k - 6.8.0-1018.19 No subscription required linux-buildinfo-6.8.0-1019-oem - 6.8.0-1019.19 linux-headers-6.8.0-1019-oem - 6.8.0-1019.19 linux-headers-oem-24.04 - 6.8.0-1019.19 linux-headers-oem-24.04a - 6.8.0-1019.19 linux-image-6.8.0-1019-oem - 6.8.0-1019.19 linux-image-oem-24.04 - 6.8.0-1019.19 linux-image-oem-24.04a - 6.8.0-1019.19 linux-image-uc-6.8.0-1019-oem - 6.8.0-1019.19 linux-image-uc-oem-24.04 - 6.8.0-1019.19 linux-image-uc-oem-24.04a - 6.8.0-1019.19 linux-image-unsigned-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-ipu6-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-ipu6-oem-24.04 - 6.8.0-1019.19 linux-modules-ipu6-oem-24.04a - 6.8.0-1019.19 linux-modules-iwlwifi-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1019.19 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1019.19 linux-modules-usbio-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-usbio-oem-24.04 - 6.8.0-1019.19 linux-modules-usbio-oem-24.04a - 6.8.0-1019.19 linux-oem-24.04 - 6.8.0-1019.19 linux-oem-24.04a - 6.8.0-1019.19 linux-oem-6.8-headers-6.8.0-1019 - 6.8.0-1019.19 linux-oem-6.8-tools-6.8.0-1019 - 6.8.0-1019.19 linux-tools-6.8.0-1019-oem - 6.8.0-1019.19 linux-tools-oem-24.04 - 6.8.0-1019.19 linux-tools-oem-24.04a - 6.8.0-1019.19 No subscription required linux-buildinfo-6.8.0-1020-gcp - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-cloud-tools-nvidia - 6.8.0-1020.22 linux-gcp - 6.8.0-1020.22 linux-gcp-headers-6.8.0-1020 - 6.8.0-1020.22 linux-gcp-tools-6.8.0-1020 - 6.8.0-1020.22 linux-headers-6.8.0-1020-gcp - 6.8.0-1020.22 linux-headers-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-headers-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-headers-gcp - 6.8.0-1020.22 linux-headers-nvidia - 6.8.0-1020.22 linux-headers-nvidia-64k - 6.8.0-1020.22 linux-image-6.8.0-1020-gcp - 6.8.0-1020.22 linux-image-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-image-gcp - 6.8.0-1020.22 linux-image-nvidia - 6.8.0-1020.22 linux-image-nvidia-64k - 6.8.0-1020.22 linux-image-uc-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-uc-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-gcp - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-6.8.0-1020-gcp - 6.8.0-1020.22 linux-modules-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-gcp - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-extra-gcp - 6.8.0-1020.22 linux-modules-nvidia-fs-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-nvidia-fs-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-nvidia-fs-nvidia - 6.8.0-1020.22 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1020.22 linux-nvidia - 6.8.0-1020.22 linux-nvidia-64k - 6.8.0-1020.22 linux-nvidia-headers-6.8.0-1020 - 6.8.0-1020.22 linux-nvidia-tools-6.8.0-1020 - 6.8.0-1020.22 linux-tools-6.8.0-1020-gcp - 6.8.0-1020.22 linux-tools-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-tools-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-tools-gcp - 6.8.0-1020.22 linux-tools-nvidia - 6.8.0-1020.22 linux-tools-nvidia-64k - 6.8.0-1020.22 No subscription required linux-buildinfo-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-buildinfo-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-headers-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-uc-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-uc-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-unsigned-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-unsigned-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-extra-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-nvidia-lowlatency - 6.8.0-1020.22.1 linux-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-nvidia-lowlatency-headers-6.8.0-1020 - 6.8.0-1020.22.1 linux-nvidia-lowlatency-tools-6.8.0-1020 - 6.8.0-1020.22.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1020.22.1 linux-tools-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-tools-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-tools-nvidia-lowlatency - 6.8.0-1020.22.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1020.22.1 No subscription required linux-aws - 6.8.0-1021.23 linux-aws-cloud-tools-6.8.0-1021 - 6.8.0-1021.23 linux-aws-headers-6.8.0-1021 - 6.8.0-1021.23 linux-aws-tools-6.8.0-1021 - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-aws - 6.8.0-1021.23 linux-cloud-tools-6.8.0-1021-aws - 6.8.0-1021.23 linux-headers-6.8.0-1021-aws - 6.8.0-1021.23 linux-headers-aws - 6.8.0-1021.23 linux-image-6.8.0-1021-aws - 6.8.0-1021.23 linux-image-aws - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-extra-aws - 6.8.0-1021.23 linux-tools-6.8.0-1021-aws - 6.8.0-1021.23 linux-tools-aws - 6.8.0-1021.23 No subscription required linux-buildinfo-6.8.0-51-generic - 6.8.0-51.52 linux-buildinfo-6.8.0-51-generic-64k - 6.8.0-51.52 linux-cloud-tools-6.8.0-51 - 6.8.0-51.52 linux-cloud-tools-6.8.0-51-generic - 6.8.0-51.52 linux-cloud-tools-common - 6.8.0-51.52 linux-cloud-tools-generic - 6.8.0-51.52 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-51.52 linux-cloud-tools-virtual - 6.8.0-51.52 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-51.52 linux-crashdump - 6.8.0-51.52 linux-doc - 6.8.0-51.52 linux-generic - 6.8.0-51.52 linux-generic-64k - 6.8.0-51.52 linux-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-generic-hwe-24.04 - 6.8.0-51.52 linux-generic-lpae - 6.8.0-51.52 linux-headers-6.8.0-51 - 6.8.0-51.52 linux-headers-6.8.0-51-generic - 6.8.0-51.52 linux-headers-6.8.0-51-generic-64k - 6.8.0-51.52 linux-headers-generic - 6.8.0-51.52 linux-headers-generic-64k - 6.8.0-51.52 linux-headers-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-headers-generic-hwe-24.04 - 6.8.0-51.52 linux-headers-generic-lpae - 6.8.0-51.52 linux-headers-kvm - 6.8.0-51.52 linux-headers-laptop-23.10 - 6.8.0-51.52 linux-headers-oem-20.04 - 6.8.0-51.52 linux-headers-oem-20.04b - 6.8.0-51.52 linux-headers-oem-20.04c - 6.8.0-51.52 linux-headers-oem-20.04d - 6.8.0-51.52 linux-headers-oem-22.04 - 6.8.0-51.52 linux-headers-virtual - 6.8.0-51.52 linux-headers-virtual-hwe-24.04 - 6.8.0-51.52 linux-image-6.8.0-51-generic - 6.8.0-51.52 linux-image-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-extra-virtual - 6.8.0-51.52 linux-image-extra-virtual-hwe-24.04 - 6.8.0-51.52 linux-image-generic - 6.8.0-51.52 linux-image-generic-64k - 6.8.0-51.52 linux-image-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-image-generic-hwe-24.04 - 6.8.0-51.52 linux-image-generic-lpae - 6.8.0-51.52 linux-image-kvm - 6.8.0-51.52 linux-image-laptop-23.10 - 6.8.0-51.52 linux-image-oem-20.04 - 6.8.0-51.52 linux-image-oem-20.04b - 6.8.0-51.52 linux-image-oem-20.04c - 6.8.0-51.52 linux-image-oem-20.04d - 6.8.0-51.52 linux-image-oem-22.04 - 6.8.0-51.52 linux-image-uc-6.8.0-51-generic - 6.8.0-51.52 linux-image-uc-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-uc-generic - 6.8.0-51.52 linux-image-uc-generic-hwe-24.04 - 6.8.0-51.52 linux-image-unsigned-6.8.0-51-generic - 6.8.0-51.52 linux-image-unsigned-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-virtual - 6.8.0-51.52 linux-image-virtual-hwe-24.04 - 6.8.0-51.52 linux-kvm - 6.8.0-51.52 linux-laptop-23.10 - 6.8.0-51.52 linux-lib-rust-6.8.0-51-generic - 6.8.0-51.52 linux-libc-dev - 6.8.0-51.52 linux-modules-6.8.0-51-generic - 6.8.0-51.52 linux-modules-6.8.0-51-generic-64k - 6.8.0-51.52 linux-modules-extra-6.8.0-51-generic - 6.8.0-51.52 linux-modules-ipu6-6.8.0-51-generic - 6.8.0-51.52 linux-modules-ipu6-generic - 6.8.0-51.52 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-51.52 linux-modules-iwlwifi-6.8.0-51-generic - 6.8.0-51.52 linux-modules-iwlwifi-generic - 6.8.0-51.52 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-51.52 linux-modules-iwlwifi-oem-20.04 - 6.8.0-51.52 linux-modules-iwlwifi-oem-20.04d - 6.8.0-51.52 linux-modules-iwlwifi-oem-22.04 - 6.8.0-51.52 linux-modules-usbio-6.8.0-51-generic - 6.8.0-51.52 linux-modules-usbio-generic - 6.8.0-51.52 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-51.52 linux-oem-20.04 - 6.8.0-51.52 linux-oem-20.04b - 6.8.0-51.52 linux-oem-20.04c - 6.8.0-51.52 linux-oem-20.04d - 6.8.0-51.52 linux-oem-22.04 - 6.8.0-51.52 linux-source - 6.8.0-51.52 linux-source-6.8.0 - 6.8.0-51.52 linux-tools-6.8.0-51 - 6.8.0-51.52 linux-tools-6.8.0-51-generic - 6.8.0-51.52 linux-tools-6.8.0-51-generic-64k - 6.8.0-51.52 linux-tools-common - 6.8.0-51.52 linux-tools-generic - 6.8.0-51.52 linux-tools-generic-64k - 6.8.0-51.52 linux-tools-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-tools-generic-hwe-24.04 - 6.8.0-51.52 linux-tools-generic-lpae - 6.8.0-51.52 linux-tools-host - 6.8.0-51.52 linux-tools-kvm - 6.8.0-51.52 linux-tools-laptop-23.10 - 6.8.0-51.52 linux-tools-oem-20.04 - 6.8.0-51.52 linux-tools-oem-20.04b - 6.8.0-51.52 linux-tools-oem-20.04c - 6.8.0-51.52 linux-tools-oem-20.04d - 6.8.0-51.52 linux-tools-oem-22.04 - 6.8.0-51.52 linux-tools-virtual - 6.8.0-51.52 linux-tools-virtual-hwe-24.04 - 6.8.0-51.52 linux-virtual - 6.8.0-51.52 linux-virtual-hwe-24.04 - 6.8.0-51.52 No subscription required
High
CVE-2024-50264
CVE-2024-53057
USN-7167-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-50264, CVE-2024-49967, CVE-2024-53057) Update Instructions: Run `sudo pro fix USN-7167-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-buildinfo-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-cloud-tools-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-cloud-tools-lowlatency - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-headers-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-headers-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-headers-lowlatency - 6.8.0-51.52.1 linux-headers-lowlatency-64k - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-image-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-image-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-image-lowlatency - 6.8.0-51.52.1 linux-image-lowlatency-64k - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-image-unsigned-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-image-unsigned-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-lowlatency - 6.8.0-51.52.1 linux-lowlatency-64k - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-lowlatency-cloud-tools-6.8.0-51 - 6.8.0-51.52.1 linux-lowlatency-headers-6.8.0-51 - 6.8.0-51.52.1 linux-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-lowlatency-lib-rust-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-lowlatency-tools-6.8.0-51 - 6.8.0-51.52.1 linux-modules-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-modules-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-modules-iwlwifi-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-modules-iwlwifi-lowlatency - 6.8.0-51.52.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-tools-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-tools-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-tools-lowlatency - 6.8.0-51.52.1 linux-tools-lowlatency-64k - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-51.52.1 No subscription required
High
CVE-2024-50264
CVE-2024-53057
USN-7170-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-49914, CVE-2024-49912, CVE-2024-49919, CVE-2024-49905, CVE-2024-49909, CVE-2024-47704, CVE-2024-49916, CVE-2024-49908, CVE-2024-49899, CVE-2024-49923, CVE-2024-49921, CVE-2024-50264, CVE-2024-49911, CVE-2024-49893, CVE-2024-53057, CVE-2024-49904, CVE-2024-49898, CVE-2024-49907, CVE-2024-49897, CVE-2024-49913, CVE-2024-49967, CVE-2024-49922, CVE-2024-49920, CVE-2024-49896, CVE-2024-49906, CVE-2024-49917, CVE-2024-49910, CVE-2024-49915, CVE-2024-49918) Update Instructions: Run `sudo pro fix USN-7170-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1010-oem - 6.11.0-1010.10 linux-headers-6.11.0-1010-oem - 6.11.0-1010.10 linux-headers-oem-24.04b - 6.11.0-1010.10 linux-image-6.11.0-1010-oem - 6.11.0-1010.10 linux-image-oem-24.04b - 6.11.0-1010.10 linux-image-uc-6.11.0-1010-oem - 6.11.0-1010.10 linux-image-uc-oem-24.04b - 6.11.0-1010.10 linux-image-unsigned-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu6-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu6-oem-24.04b - 6.11.0-1010.10 linux-modules-ipu7-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu7-oem-24.04b - 6.11.0-1010.10 linux-modules-iwlwifi-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1010.10 linux-modules-usbio-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-usbio-oem-24.04b - 6.11.0-1010.10 linux-modules-vision-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-vision-oem-24.04b - 6.11.0-1010.10 linux-oem-24.04b - 6.11.0-1010.10 linux-oem-6.11-headers-6.11.0-1010 - 6.11.0-1010.10 linux-oem-6.11-tools-6.11.0-1010 - 6.11.0-1010.10 linux-tools-6.11.0-1010-oem - 6.11.0-1010.10 linux-tools-oem-24.04b - 6.11.0-1010.10 No subscription required
High
CVE-2024-47704
CVE-2024-49893
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49899
CVE-2024-49904
CVE-2024-49905
CVE-2024-49906
CVE-2024-49907
CVE-2024-49908
CVE-2024-49909
CVE-2024-49910
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49914
CVE-2024-49915
CVE-2024-49916
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49920
CVE-2024-49921
CVE-2024-49922
CVE-2024-49923
CVE-2024-50264
CVE-2024-53057
USN-7174-1 -- GStreamer vulnerability
Ubuntu 24.04 LTS
Antonio Morales discovered that GStreamer incorrectly handled allocating memory for certain buffers. An attacker could use this issue to cause GStreamer to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7174-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gstreamer-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-tools - 1.24.2-1ubuntu0.1 libgstreamer1.0-0 - 1.24.2-1ubuntu0.1 libgstreamer1.0-dev - 1.24.2-1ubuntu0.1 No subscription required
Medium
CVE-2024-47606
USN-7175-1 -- GStreamer Base Plugins vulnerabilities
Ubuntu 24.04 LTS
Antonio Morales discovered that GStreamer Base Plugins incorrectly handled certain malformed media files. An attacker could use these issues to cause GStreamer Base Plugins to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7175-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.2 gstreamer1.0-alsa - 1.24.2-1ubuntu0.2 gstreamer1.0-gl - 1.24.2-1ubuntu0.2 gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.2 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.2 gstreamer1.0-x - 1.24.2-1ubuntu0.2 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.2 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.2 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.2 No subscription required
Medium
CVE-2024-47538
CVE-2024-47541
CVE-2024-47542
CVE-2024-47600
CVE-2024-47607
CVE-2024-47615
CVE-2024-47835
USN-7176-1 -- GStreamer Good Plugins vulnerabilities
Ubuntu 24.04 LTS
Antonio Morales discovered that GStreamer Good Plugins incorrectly handled certain malformed media files. An attacker could use these issues to cause GStreamer Good Plugins to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7176-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-gtk3 - 1.24.2-1ubuntu1.1 gstreamer1.0-plugins-good - 1.24.2-1ubuntu1.1 gstreamer1.0-pulseaudio - 1.24.2-1ubuntu1.1 gstreamer1.0-qt5 - 1.24.2-1ubuntu1.1 gstreamer1.0-qt6 - 1.24.2-1ubuntu1.1 libgstreamer-plugins-good1.0-0 - 1.24.2-1ubuntu1.1 libgstreamer-plugins-good1.0-dev - 1.24.2-1ubuntu1.1 No subscription required
Medium
CVE-2024-47537
CVE-2024-47539
CVE-2024-47540
CVE-2024-47543
CVE-2024-47544
CVE-2024-47545
CVE-2024-47546
CVE-2024-47596
CVE-2024-47597
CVE-2024-47598
CVE-2024-47599
CVE-2024-47601
CVE-2024-47602
CVE-2024-47603
CVE-2024-47606
CVE-2024-47613
CVE-2024-47774
CVE-2024-47775
CVE-2024-47776
CVE-2024-47777
CVE-2024-47778
CVE-2024-47834
USN-7178-1 -- DPDK vulnerability
Ubuntu 24.04 LTS
It was discovered that DPDK incorrectly handled the Vhost library checksum offload feature. An malicious guest could possibly use this issue to cause the hypervisor's vSwitch to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7178-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dpdk - 23.11-1ubuntu0.1 dpdk-dev - 23.11-1ubuntu0.1 dpdk-doc - 23.11-1ubuntu0.1 libdpdk-dev - 23.11-1ubuntu0.1 librte-acl24 - 23.11-1ubuntu0.1 librte-baseband-acc24 - 23.11-1ubuntu0.1 librte-baseband-fpga-5gnr-fec24 - 23.11-1ubuntu0.1 librte-baseband-fpga-lte-fec24 - 23.11-1ubuntu0.1 librte-baseband-la12xx24 - 23.11-1ubuntu0.1 librte-baseband-null24 - 23.11-1ubuntu0.1 librte-baseband-turbo-sw24 - 23.11-1ubuntu0.1 librte-bbdev24 - 23.11-1ubuntu0.1 librte-bitratestats24 - 23.11-1ubuntu0.1 librte-bpf24 - 23.11-1ubuntu0.1 librte-bus-auxiliary24 - 23.11-1ubuntu0.1 librte-bus-cdx24 - 23.11-1ubuntu0.1 librte-bus-dpaa24 - 23.11-1ubuntu0.1 librte-bus-fslmc24 - 23.11-1ubuntu0.1 librte-bus-ifpga24 - 23.11-1ubuntu0.1 librte-bus-pci24 - 23.11-1ubuntu0.1 librte-bus-platform24 - 23.11-1ubuntu0.1 librte-bus-vdev24 - 23.11-1ubuntu0.1 librte-bus-vmbus24 - 23.11-1ubuntu0.1 librte-cfgfile24 - 23.11-1ubuntu0.1 librte-cmdline24 - 23.11-1ubuntu0.1 librte-common-cnxk24 - 23.11-1ubuntu0.1 librte-common-cpt24 - 23.11-1ubuntu0.1 librte-common-dpaax24 - 23.11-1ubuntu0.1 librte-common-iavf24 - 23.11-1ubuntu0.1 librte-common-idpf24 - 23.11-1ubuntu0.1 librte-common-mlx5-24 - 23.11-1ubuntu0.1 librte-common-nfp24 - 23.11-1ubuntu0.1 librte-common-octeontx24 - 23.11-1ubuntu0.1 librte-common-qat24 - 23.11-1ubuntu0.1 librte-common-sfc-efx24 - 23.11-1ubuntu0.1 librte-compress-isal24 - 23.11-1ubuntu0.1 librte-compress-mlx5-24 - 23.11-1ubuntu0.1 librte-compress-octeontx24 - 23.11-1ubuntu0.1 librte-compress-zlib24 - 23.11-1ubuntu0.1 librte-compressdev24 - 23.11-1ubuntu0.1 librte-crypto-bcmfs24 - 23.11-1ubuntu0.1 librte-crypto-caam-jr24 - 23.11-1ubuntu0.1 librte-crypto-ccp24 - 23.11-1ubuntu0.1 librte-crypto-cnxk24 - 23.11-1ubuntu0.1 librte-crypto-dpaa-sec24 - 23.11-1ubuntu0.1 librte-crypto-dpaa2-sec24 - 23.11-1ubuntu0.1 librte-crypto-ipsec-mb24 - 23.11-1ubuntu0.1 librte-crypto-mlx5-24 - 23.11-1ubuntu0.1 librte-crypto-nitrox24 - 23.11-1ubuntu0.1 librte-crypto-null24 - 23.11-1ubuntu0.1 librte-crypto-octeontx24 - 23.11-1ubuntu0.1 librte-crypto-openssl24 - 23.11-1ubuntu0.1 librte-crypto-scheduler24 - 23.11-1ubuntu0.1 librte-crypto-virtio24 - 23.11-1ubuntu0.1 librte-cryptodev24 - 23.11-1ubuntu0.1 librte-dispatcher24 - 23.11-1ubuntu0.1 librte-distributor24 - 23.11-1ubuntu0.1 librte-dma-cnxk24 - 23.11-1ubuntu0.1 librte-dma-dpaa2-24 - 23.11-1ubuntu0.1 librte-dma-dpaa24 - 23.11-1ubuntu0.1 librte-dma-hisilicon24 - 23.11-1ubuntu0.1 librte-dma-idxd24 - 23.11-1ubuntu0.1 librte-dma-ioat24 - 23.11-1ubuntu0.1 librte-dma-skeleton24 - 23.11-1ubuntu0.1 librte-dmadev24 - 23.11-1ubuntu0.1 librte-eal24 - 23.11-1ubuntu0.1 librte-efd24 - 23.11-1ubuntu0.1 librte-ethdev24 - 23.11-1ubuntu0.1 librte-event-cnxk24 - 23.11-1ubuntu0.1 librte-event-dlb2-24 - 23.11-1ubuntu0.1 librte-event-dpaa2-24 - 23.11-1ubuntu0.1 librte-event-dpaa24 - 23.11-1ubuntu0.1 librte-event-dsw24 - 23.11-1ubuntu0.1 librte-event-octeontx24 - 23.11-1ubuntu0.1 librte-event-opdl24 - 23.11-1ubuntu0.1 librte-event-skeleton24 - 23.11-1ubuntu0.1 librte-event-sw24 - 23.11-1ubuntu0.1 librte-eventdev24 - 23.11-1ubuntu0.1 librte-fib24 - 23.11-1ubuntu0.1 librte-gpudev24 - 23.11-1ubuntu0.1 librte-graph24 - 23.11-1ubuntu0.1 librte-gro24 - 23.11-1ubuntu0.1 librte-gso24 - 23.11-1ubuntu0.1 librte-hash24 - 23.11-1ubuntu0.1 librte-ip-frag24 - 23.11-1ubuntu0.1 librte-ipsec24 - 23.11-1ubuntu0.1 librte-jobstats24 - 23.11-1ubuntu0.1 librte-kvargs24 - 23.11-1ubuntu0.1 librte-latencystats24 - 23.11-1ubuntu0.1 librte-log24 - 23.11-1ubuntu0.1 librte-lpm24 - 23.11-1ubuntu0.1 librte-mbuf24 - 23.11-1ubuntu0.1 librte-member24 - 23.11-1ubuntu0.1 librte-mempool-bucket24 - 23.11-1ubuntu0.1 librte-mempool-cnxk24 - 23.11-1ubuntu0.1 librte-mempool-dpaa2-24 - 23.11-1ubuntu0.1 librte-mempool-dpaa24 - 23.11-1ubuntu0.1 librte-mempool-octeontx24 - 23.11-1ubuntu0.1 librte-mempool-ring24 - 23.11-1ubuntu0.1 librte-mempool-stack24 - 23.11-1ubuntu0.1 librte-mempool24 - 23.11-1ubuntu0.1 librte-meta-all - 23.11-1ubuntu0.1 librte-meta-allpmds - 23.11-1ubuntu0.1 librte-meta-baseband - 23.11-1ubuntu0.1 librte-meta-bus - 23.11-1ubuntu0.1 librte-meta-common - 23.11-1ubuntu0.1 librte-meta-compress - 23.11-1ubuntu0.1 librte-meta-crypto - 23.11-1ubuntu0.1 librte-meta-dma - 23.11-1ubuntu0.1 librte-meta-event - 23.11-1ubuntu0.1 librte-meta-mempool - 23.11-1ubuntu0.1 librte-meta-net - 23.11-1ubuntu0.1 librte-meta-raw - 23.11-1ubuntu0.1 librte-meter24 - 23.11-1ubuntu0.1 librte-metrics24 - 23.11-1ubuntu0.1 librte-ml-cnxk24 - 23.11-1ubuntu0.1 librte-mldev24 - 23.11-1ubuntu0.1 librte-net-af-packet24 - 23.11-1ubuntu0.1 librte-net-af-xdp24 - 23.11-1ubuntu0.1 librte-net-ark24 - 23.11-1ubuntu0.1 librte-net-atlantic24 - 23.11-1ubuntu0.1 librte-net-avp24 - 23.11-1ubuntu0.1 librte-net-axgbe24 - 23.11-1ubuntu0.1 librte-net-bnx2x24 - 23.11-1ubuntu0.1 librte-net-bnxt24 - 23.11-1ubuntu0.1 librte-net-bond24 - 23.11-1ubuntu0.1 librte-net-cnxk24 - 23.11-1ubuntu0.1 librte-net-cpfl24 - 23.11-1ubuntu0.1 librte-net-cxgbe24 - 23.11-1ubuntu0.1 librte-net-dpaa2-24 - 23.11-1ubuntu0.1 librte-net-dpaa24 - 23.11-1ubuntu0.1 librte-net-e1000-24 - 23.11-1ubuntu0.1 librte-net-ena24 - 23.11-1ubuntu0.1 librte-net-enetc24 - 23.11-1ubuntu0.1 librte-net-enetfec24 - 23.11-1ubuntu0.1 librte-net-enic24 - 23.11-1ubuntu0.1 librte-net-failsafe24 - 23.11-1ubuntu0.1 librte-net-fm10k24 - 23.11-1ubuntu0.1 librte-net-gve24 - 23.11-1ubuntu0.1 librte-net-hinic24 - 23.11-1ubuntu0.1 librte-net-hns3-24 - 23.11-1ubuntu0.1 librte-net-i40e24 - 23.11-1ubuntu0.1 librte-net-iavf24 - 23.11-1ubuntu0.1 librte-net-ice24 - 23.11-1ubuntu0.1 librte-net-idpf24 - 23.11-1ubuntu0.1 librte-net-igc24 - 23.11-1ubuntu0.1 librte-net-ionic24 - 23.11-1ubuntu0.1 librte-net-ipn3ke24 - 23.11-1ubuntu0.1 librte-net-ixgbe24 - 23.11-1ubuntu0.1 librte-net-mana24 - 23.11-1ubuntu0.1 librte-net-memif24 - 23.11-1ubuntu0.1 librte-net-mlx4-24 - 23.11-1ubuntu0.1 librte-net-mlx5-24 - 23.11-1ubuntu0.1 librte-net-netvsc24 - 23.11-1ubuntu0.1 librte-net-nfp24 - 23.11-1ubuntu0.1 librte-net-ngbe24 - 23.11-1ubuntu0.1 librte-net-null24 - 23.11-1ubuntu0.1 librte-net-octeon-ep24 - 23.11-1ubuntu0.1 librte-net-octeontx24 - 23.11-1ubuntu0.1 librte-net-pcap24 - 23.11-1ubuntu0.1 librte-net-pfe24 - 23.11-1ubuntu0.1 librte-net-qede24 - 23.11-1ubuntu0.1 librte-net-ring24 - 23.11-1ubuntu0.1 librte-net-sfc24 - 23.11-1ubuntu0.1 librte-net-softnic24 - 23.11-1ubuntu0.1 librte-net-tap24 - 23.11-1ubuntu0.1 librte-net-thunderx24 - 23.11-1ubuntu0.1 librte-net-txgbe24 - 23.11-1ubuntu0.1 librte-net-vdev-netvsc24 - 23.11-1ubuntu0.1 librte-net-vhost24 - 23.11-1ubuntu0.1 librte-net-virtio24 - 23.11-1ubuntu0.1 librte-net-vmxnet3-24 - 23.11-1ubuntu0.1 librte-net24 - 23.11-1ubuntu0.1 librte-node24 - 23.11-1ubuntu0.1 librte-pcapng24 - 23.11-1ubuntu0.1 librte-pci24 - 23.11-1ubuntu0.1 librte-pdcp24 - 23.11-1ubuntu0.1 librte-pdump24 - 23.11-1ubuntu0.1 librte-pipeline24 - 23.11-1ubuntu0.1 librte-port24 - 23.11-1ubuntu0.1 librte-power24 - 23.11-1ubuntu0.1 librte-raw-cnxk-bphy24 - 23.11-1ubuntu0.1 librte-raw-cnxk-gpio24 - 23.11-1ubuntu0.1 librte-raw-dpaa2-cmdif24 - 23.11-1ubuntu0.1 librte-raw-ifpga24 - 23.11-1ubuntu0.1 librte-raw-ntb24 - 23.11-1ubuntu0.1 librte-raw-skeleton24 - 23.11-1ubuntu0.1 librte-rawdev24 - 23.11-1ubuntu0.1 librte-rcu24 - 23.11-1ubuntu0.1 librte-regex-cn9k24 - 23.11-1ubuntu0.1 librte-regex-mlx5-24 - 23.11-1ubuntu0.1 librte-regexdev24 - 23.11-1ubuntu0.1 librte-reorder24 - 23.11-1ubuntu0.1 librte-rib24 - 23.11-1ubuntu0.1 librte-ring24 - 23.11-1ubuntu0.1 librte-sched24 - 23.11-1ubuntu0.1 librte-security24 - 23.11-1ubuntu0.1 librte-stack24 - 23.11-1ubuntu0.1 librte-table24 - 23.11-1ubuntu0.1 librte-telemetry24 - 23.11-1ubuntu0.1 librte-timer24 - 23.11-1ubuntu0.1 librte-vdpa-ifc24 - 23.11-1ubuntu0.1 librte-vdpa-mlx5-24 - 23.11-1ubuntu0.1 librte-vdpa-nfp24 - 23.11-1ubuntu0.1 librte-vdpa-sfc24 - 23.11-1ubuntu0.1 librte-vhost24 - 23.11-1ubuntu0.1 No subscription required
Medium
CVE-2024-11614
USN-7182-1 -- Ceph vulnerability
Ubuntu 24.04 LTS
It was discovered that Ceph incorrectly handled unsupported JWT algorithms in the RadosGW gateway. An attacker could possibly use this issue to bypass certain authentication checks and restrictions. Update Instructions: Run `sudo pro fix USN-7182-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ceph - 19.2.0-0ubuntu0.24.04.2 ceph-base - 19.2.0-0ubuntu0.24.04.2 ceph-common - 19.2.0-0ubuntu0.24.04.2 ceph-fuse - 19.2.0-0ubuntu0.24.04.2 ceph-grafana-dashboards - 19.2.0-0ubuntu0.24.04.2 ceph-immutable-object-cache - 19.2.0-0ubuntu0.24.04.2 ceph-mds - 19.2.0-0ubuntu0.24.04.2 ceph-mgr - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-cephadm - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-dashboard - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-diskprediction-local - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-k8sevents - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-modules-core - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-rook - 19.2.0-0ubuntu0.24.04.2 ceph-mon - 19.2.0-0ubuntu0.24.04.2 ceph-osd - 19.2.0-0ubuntu0.24.04.2 ceph-prometheus-alerts - 19.2.0-0ubuntu0.24.04.2 ceph-resource-agents - 19.2.0-0ubuntu0.24.04.2 ceph-volume - 19.2.0-0ubuntu0.24.04.2 cephadm - 19.2.0-0ubuntu0.24.04.2 cephfs-mirror - 19.2.0-0ubuntu0.24.04.2 cephfs-shell - 19.2.0-0ubuntu0.24.04.2 crimson-osd - 19.2.0-0ubuntu0.24.04.2 libcephfs-dev - 19.2.0-0ubuntu0.24.04.2 libcephfs-java - 19.2.0-0ubuntu0.24.04.2 libcephfs-jni - 19.2.0-0ubuntu0.24.04.2 libcephfs2 - 19.2.0-0ubuntu0.24.04.2 librados-dev - 19.2.0-0ubuntu0.24.04.2 librados2 - 19.2.0-0ubuntu0.24.04.2 libradospp-dev - 19.2.0-0ubuntu0.24.04.2 libradosstriper-dev - 19.2.0-0ubuntu0.24.04.2 libradosstriper1 - 19.2.0-0ubuntu0.24.04.2 librbd-dev - 19.2.0-0ubuntu0.24.04.2 librbd1 - 19.2.0-0ubuntu0.24.04.2 librgw-dev - 19.2.0-0ubuntu0.24.04.2 librgw2 - 19.2.0-0ubuntu0.24.04.2 libsqlite3-mod-ceph - 19.2.0-0ubuntu0.24.04.2 libsqlite3-mod-ceph-dev - 19.2.0-0ubuntu0.24.04.2 python3-ceph - 19.2.0-0ubuntu0.24.04.2 python3-ceph-argparse - 19.2.0-0ubuntu0.24.04.2 python3-ceph-common - 19.2.0-0ubuntu0.24.04.2 python3-cephfs - 19.2.0-0ubuntu0.24.04.2 python3-rados - 19.2.0-0ubuntu0.24.04.2 python3-rbd - 19.2.0-0ubuntu0.24.04.2 python3-rgw - 19.2.0-0ubuntu0.24.04.2 rados-objclass-dev - 19.2.0-0ubuntu0.24.04.2 radosgw - 19.2.0-0ubuntu0.24.04.2 rbd-fuse - 19.2.0-0ubuntu0.24.04.2 rbd-mirror - 19.2.0-0ubuntu0.24.04.2 rbd-nbd - 19.2.0-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-48916
USN-7187-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - Intel ASoC drivers; (CVE-2024-50011, CVE-2024-47715) Update Instructions: Run `sudo pro fix USN-7187-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1011-oem - 6.11.0-1011.11 linux-headers-6.11.0-1011-oem - 6.11.0-1011.11 linux-headers-oem-24.04b - 6.11.0-1011.11 linux-image-6.11.0-1011-oem - 6.11.0-1011.11 linux-image-oem-24.04b - 6.11.0-1011.11 linux-image-uc-6.11.0-1011-oem - 6.11.0-1011.11 linux-image-uc-oem-24.04b - 6.11.0-1011.11 linux-image-unsigned-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu6-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu6-oem-24.04b - 6.11.0-1011.11 linux-modules-ipu7-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu7-oem-24.04b - 6.11.0-1011.11 linux-modules-iwlwifi-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1011.11 linux-modules-usbio-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-usbio-oem-24.04b - 6.11.0-1011.11 linux-modules-vision-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-vision-oem-24.04b - 6.11.0-1011.11 linux-oem-24.04b - 6.11.0-1011.11 linux-oem-6.11-headers-6.11.0-1011 - 6.11.0-1011.11 linux-oem-6.11-tools-6.11.0-1011 - 6.11.0-1011.11 linux-tools-6.11.0-1011-oem - 6.11.0-1011.11 linux-tools-oem-24.04b - 6.11.0-1011.11 No subscription required
Medium
CVE-2024-47715
CVE-2024-50011
USN-7190-1 -- Tinyproxy vulnerability
Ubuntu 24.04 LTS
It was discovered that Tinyproxy did not properly manage memory during the parsing of HTTP connection headers. An attacker could use this issue to cause a DoS or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7190-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tinyproxy - 1.11.1-3ubuntu0.1 tinyproxy-bin - 1.11.1-3ubuntu0.1 No subscription required
Medium
CVE-2023-49606
USN-7192-1 -- xfpt vulnerability
Ubuntu 24.04 LTS
It was discovered that xfpt did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7192-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xfpt - 1.00-2ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-43700
USN-7196-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-44979, CVE-2024-47658, CVE-2024-44970, CVE-2024-43913, CVE-2024-46816, CVE-2024-46738, CVE-2024-46777, CVE-2024-46730, CVE-2024-46811, CVE-2024-44954, CVE-2024-42317, CVE-2024-42279, CVE-2024-45002, CVE-2024-43826, CVE-2024-44967, CVE-2024-46721, CVE-2024-46763, CVE-2024-43856, CVE-2024-42284, CVE-2024-42289, CVE-2024-46806, CVE-2024-46776, CVE-2024-43843, CVE-2024-42298, CVE-2024-43832, CVE-2024-42321, CVE-2024-42292, CVE-2024-44982, CVE-2024-43842, CVE-2024-46772, CVE-2024-46702, CVE-2024-45017, CVE-2024-43888, CVE-2024-47683, CVE-2024-46714, CVE-2024-43899, CVE-2024-45025, CVE-2024-46751, CVE-2024-45020, CVE-2024-44977, CVE-2024-46853, CVE-2024-46753, CVE-2024-46792, CVE-2024-46675, CVE-2024-46805, CVE-2024-43890, CVE-2024-46703, CVE-2024-43841, CVE-2024-44960, CVE-2024-46846, CVE-2024-46798, CVE-2024-44965, CVE-2024-46812, CVE-2024-43835, CVE-2024-43839, CVE-2024-43886, CVE-2024-46843, CVE-2024-50264, CVE-2024-46706, CVE-2024-46851, CVE-2024-46758, CVE-2024-45027, CVE-2024-43887, CVE-2024-42278, CVE-2024-46701, CVE-2024-46708, CVE-2024-46817, CVE-2024-46871, CVE-2024-46771, CVE-2024-42304, CVE-2024-43877, CVE-2024-44996, CVE-2024-46741, CVE-2024-46842, CVE-2024-43902, CVE-2024-43818, CVE-2024-47662, CVE-2024-44931, CVE-2024-46793, CVE-2024-46746, CVE-2024-46782, CVE-2024-43914, CVE-2024-43824, CVE-2024-46767, CVE-2024-43871, CVE-2024-44971, CVE-2024-47666, CVE-2024-45008, CVE-2024-42263, CVE-2024-46815, CVE-2024-46824, CVE-2024-45015, CVE-2024-45000, CVE-2024-46841, CVE-2024-46770, CVE-2024-44942, CVE-2024-46679, CVE-2024-46724, CVE-2024-46759, CVE-2024-43845, CVE-2024-46795, CVE-2024-46818, CVE-2024-44988, CVE-2024-46807, CVE-2024-46787, CVE-2024-43894, CVE-2024-46803, CVE-2024-44947, CVE-2024-46786, CVE-2024-46689, CVE-2024-46686, CVE-2024-42290, CVE-2024-46868, CVE-2024-43857, CVE-2024-43909, CVE-2023-52889, CVE-2024-44944, CVE-2024-44973, CVE-2024-43905, CVE-2024-44938, CVE-2024-43864, CVE-2024-46850, CVE-2024-43867, CVE-2024-43819, CVE-2024-46691, CVE-2024-47664, CVE-2024-46821, CVE-2024-46867, CVE-2024-46716, CVE-2024-43881, CVE-2024-46788, CVE-2024-43912, CVE-2024-43904, CVE-2024-46727, CVE-2024-46680, CVE-2024-44985, CVE-2024-46813, CVE-2024-47668, CVE-2024-42277, CVE-2024-42291, CVE-2024-45003, CVE-2024-42309, CVE-2024-44937, CVE-2024-44953, CVE-2024-46718, CVE-2024-42276, CVE-2024-45028, CVE-2024-43863, CVE-2024-46866, CVE-2024-42258, CVE-2024-42273, CVE-2024-46717, CVE-2024-46797, CVE-2024-46854, CVE-2024-44972, CVE-2024-46791, CVE-2024-45010, CVE-2024-43825, CVE-2024-46775, CVE-2024-46745, CVE-2024-46808, CVE-2024-46831, CVE-2024-45018, CVE-2024-42319, CVE-2024-46822, CVE-2024-43883, CVE-2024-46722, CVE-2024-46694, CVE-2024-45009, CVE-2024-42320, CVE-2024-46825, CVE-2024-43821, CVE-2024-46749, CVE-2024-45006, CVE-2024-43895, CVE-2024-44950, CVE-2024-43827, CVE-2024-43876, CVE-2024-47659, CVE-2024-44989, CVE-2024-46804, CVE-2024-46754, CVE-2024-46766, CVE-2024-46728, CVE-2024-46828, CVE-2024-46826, CVE-2024-46810, CVE-2024-44963, CVE-2024-44934, CVE-2024-43829, CVE-2024-42268, CVE-2024-43850, CVE-2024-43853, CVE-2024-43854, CVE-2024-43892, CVE-2024-43859, CVE-2024-42285, CVE-2024-44962, CVE-2024-46725, CVE-2024-46814, CVE-2024-44935, CVE-2024-42264, CVE-2024-42260, CVE-2024-46858, CVE-2024-46778, CVE-2024-46774, CVE-2024-46848, CVE-2024-45013, CVE-2024-43837, CVE-2024-46683, CVE-2024-46757, CVE-2024-46726, CVE-2024-43831, CVE-2024-46737, CVE-2024-43893, CVE-2024-46823, CVE-2024-42302, CVE-2024-44990, CVE-2024-46755, CVE-2024-46707, CVE-2024-43833, CVE-2024-44940, CVE-2024-42259, CVE-2024-46855, CVE-2024-46827, CVE-2024-46809, CVE-2024-46836, CVE-2024-43907, CVE-2024-42312, CVE-2024-46692, CVE-2024-42297, CVE-2024-46864, CVE-2024-42299, CVE-2024-45011, CVE-2024-46838, CVE-2024-44993, CVE-2024-46802, CVE-2024-44966, CVE-2024-46739, CVE-2024-46780, CVE-2024-44961, CVE-2024-42316, CVE-2024-47660, CVE-2024-46859, CVE-2024-46762, CVE-2024-43861, CVE-2024-45012, CVE-2024-46784, CVE-2024-43908, CVE-2024-46832, CVE-2024-44969, CVE-2024-46750, CVE-2024-44958, CVE-2024-46740, CVE-2024-46829, CVE-2024-43873, CVE-2024-49984, CVE-2024-44983, CVE-2024-42288, CVE-2024-46735, CVE-2024-46676, CVE-2024-43823, CVE-2024-46779, CVE-2024-46744, CVE-2024-42310, CVE-2024-44980, CVE-2024-46870, CVE-2024-42307, CVE-2024-46768, CVE-2024-44984, CVE-2024-45007, CVE-2024-46710, CVE-2024-44978, CVE-2024-46723, CVE-2024-46845, CVE-2024-44999, CVE-2024-42311, CVE-2024-43884, CVE-2024-44939, CVE-2024-44974, CVE-2024-42314, CVE-2024-42318, CVE-2024-39472, CVE-2024-46693, CVE-2024-46794, CVE-2024-46844, CVE-2024-46695, CVE-2024-46720, CVE-2024-46860, CVE-2024-46835, CVE-2024-47665, CVE-2024-46715, CVE-2024-42305, CVE-2024-46773, CVE-2024-45030, CVE-2024-46697, CVE-2024-46705, CVE-2024-42286, CVE-2024-46834, CVE-2024-46681, CVE-2024-53057, CVE-2024-42303, CVE-2024-46678, CVE-2024-46756, CVE-2023-52918, CVE-2024-43860, CVE-2024-43911, CVE-2024-43880, CVE-2024-43910, CVE-2024-44975, CVE-2024-44959, CVE-2024-46747, CVE-2024-43846, CVE-2024-42274, CVE-2024-46672, CVE-2024-43852, CVE-2024-46709, CVE-2024-42306, CVE-2024-42281, CVE-2024-46849, CVE-2024-46719, CVE-2024-43830, CVE-2024-46685, CVE-2024-44998, CVE-2024-42313, CVE-2024-43820, CVE-2024-44991, CVE-2024-47674, CVE-2024-46785, CVE-2024-45021, CVE-2024-46677, CVE-2024-43870, CVE-2024-46698, CVE-2024-43900, CVE-2024-44956, CVE-2024-43849, CVE-2024-46687, CVE-2024-42296, CVE-2024-46830, CVE-2024-47669, CVE-2024-46732, CVE-2024-46733, CVE-2024-46852, CVE-2024-43906, CVE-2024-43847, CVE-2024-42294, CVE-2024-46731, CVE-2024-45029, CVE-2024-47667, CVE-2024-42272, CVE-2024-45022, CVE-2024-43879, CVE-2024-46765, CVE-2024-45026, CVE-2024-44986, CVE-2024-44995, CVE-2024-47663, CVE-2024-42262, CVE-2024-43889, CVE-2024-44987, CVE-2024-43866, CVE-2024-42265, CVE-2024-46847, CVE-2024-46673, CVE-2024-46783, CVE-2024-46761, CVE-2024-46840, CVE-2024-42301, CVE-2024-43868, CVE-2024-45005, CVE-2024-42322, CVE-2024-43828, CVE-2024-43834, CVE-2024-43891, CVE-2024-46861, CVE-2024-42261, CVE-2024-43875, CVE-2024-43840, CVE-2024-42287, CVE-2024-46752, CVE-2024-46711, CVE-2024-46713, CVE-2024-44943, CVE-2024-46743, CVE-2024-43869, CVE-2024-46781, CVE-2024-44946, CVE-2024-42283, CVE-2024-47661, CVE-2024-43817, CVE-2024-46819, CVE-2024-42267, CVE-2024-46729, CVE-2024-46857, CVE-2024-42295, CVE-2024-46760, CVE-2024-42315, CVE-2024-45019, CVE-2024-44948, CVE-2024-44941, CVE-2024-42269, CVE-2024-44957, CVE-2024-49967) Update Instructions: Run `sudo pro fix USN-7196-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1020.23 linux-azure-cloud-tools-6.8.0-1020 - 6.8.0-1020.23 linux-azure-fde - 6.8.0-1020.23 linux-azure-headers-6.8.0-1020 - 6.8.0-1020.23 linux-azure-tools-6.8.0-1020 - 6.8.0-1020.23 linux-buildinfo-6.8.0-1020-azure - 6.8.0-1020.23 linux-cloud-tools-6.8.0-1020-azure - 6.8.0-1020.23 linux-cloud-tools-azure - 6.8.0-1020.23 linux-headers-6.8.0-1020-azure - 6.8.0-1020.23 linux-headers-azure - 6.8.0-1020.23 linux-image-6.8.0-1020-azure - 6.8.0-1020.23 linux-image-6.8.0-1020-azure-fde - 6.8.0-1020.23 linux-image-azure - 6.8.0-1020.23 linux-image-azure-fde - 6.8.0-1020.23 linux-image-unsigned-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-extra-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-extra-azure - 6.8.0-1020.23 linux-modules-involflt-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-involflt-azure - 6.8.0-1020.23 linux-modules-iwlwifi-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-iwlwifi-azure - 6.8.0-1020.23 linux-tools-6.8.0-1020-azure - 6.8.0-1020.23 linux-tools-azure - 6.8.0-1020.23 No subscription required
High
CVE-2023-52889
CVE-2023-52918
CVE-2024-39472
CVE-2024-42258
CVE-2024-42259
CVE-2024-42260
CVE-2024-42261
CVE-2024-42262
CVE-2024-42263
CVE-2024-42264
CVE-2024-42265
CVE-2024-42267
CVE-2024-42268
CVE-2024-42269
CVE-2024-42272
CVE-2024-42273
CVE-2024-42274
CVE-2024-42276
CVE-2024-42277
CVE-2024-42278
CVE-2024-42279
CVE-2024-42281
CVE-2024-42283
CVE-2024-42284
CVE-2024-42285
CVE-2024-42286
CVE-2024-42287
CVE-2024-42288
CVE-2024-42289
CVE-2024-42290
CVE-2024-42291
CVE-2024-42292
CVE-2024-42294
CVE-2024-42295
CVE-2024-42296
CVE-2024-42297
CVE-2024-42298
CVE-2024-42299
CVE-2024-42301
CVE-2024-42302
CVE-2024-42303
CVE-2024-42304
CVE-2024-42305
CVE-2024-42306
CVE-2024-42307
CVE-2024-42309
CVE-2024-42310
CVE-2024-42311
CVE-2024-42312
CVE-2024-42313
CVE-2024-42314
CVE-2024-42315
CVE-2024-42316
CVE-2024-42317
CVE-2024-42318
CVE-2024-42319
CVE-2024-42320
CVE-2024-42321
CVE-2024-42322
CVE-2024-43817
CVE-2024-43818
CVE-2024-43819
CVE-2024-43820
CVE-2024-43821
CVE-2024-43823
CVE-2024-43824
CVE-2024-43825
CVE-2024-43826
CVE-2024-43827
CVE-2024-43828
CVE-2024-43829
CVE-2024-43830
CVE-2024-43831
CVE-2024-43832
CVE-2024-43833
CVE-2024-43834
CVE-2024-43835
CVE-2024-43837
CVE-2024-43839
CVE-2024-43840
CVE-2024-43841
CVE-2024-43842
CVE-2024-43843
CVE-2024-43845
CVE-2024-43846
CVE-2024-43847
CVE-2024-43849
CVE-2024-43850
CVE-2024-43852
CVE-2024-43853
CVE-2024-43854
CVE-2024-43856
CVE-2024-43857
CVE-2024-43859
CVE-2024-43860
CVE-2024-43861
CVE-2024-43863
CVE-2024-43864
CVE-2024-43866
CVE-2024-43867
CVE-2024-43868
CVE-2024-43869
CVE-2024-43870
CVE-2024-43871
CVE-2024-43873
CVE-2024-43875
CVE-2024-43876
CVE-2024-43877
CVE-2024-43879
CVE-2024-43880
CVE-2024-43881
CVE-2024-43883
CVE-2024-43884
CVE-2024-43886
CVE-2024-43887
CVE-2024-43888
CVE-2024-43889
CVE-2024-43890
CVE-2024-43891
CVE-2024-43892
CVE-2024-43893
CVE-2024-43894
CVE-2024-43895
CVE-2024-43899
CVE-2024-43900
CVE-2024-43902
CVE-2024-43904
CVE-2024-43905
CVE-2024-43906
CVE-2024-43907
CVE-2024-43908
CVE-2024-43909
CVE-2024-43910
CVE-2024-43911
CVE-2024-43912
CVE-2024-43913
CVE-2024-43914
CVE-2024-44931
CVE-2024-44934
CVE-2024-44935
CVE-2024-44937
CVE-2024-44938
CVE-2024-44939
CVE-2024-44940
CVE-2024-44941
CVE-2024-44942
CVE-2024-44943
CVE-2024-44944
CVE-2024-44946
CVE-2024-44947
CVE-2024-44948
CVE-2024-44950
CVE-2024-44953
CVE-2024-44954
CVE-2024-44956
CVE-2024-44957
CVE-2024-44958
CVE-2024-44959
CVE-2024-44960
CVE-2024-44961
CVE-2024-44962
CVE-2024-44963
CVE-2024-44965
CVE-2024-44966
CVE-2024-44967
CVE-2024-44969
CVE-2024-44970
CVE-2024-44971
CVE-2024-44972
CVE-2024-44973
CVE-2024-44974
CVE-2024-44975
CVE-2024-44977
CVE-2024-44978
CVE-2024-44979
CVE-2024-44980
CVE-2024-44982
CVE-2024-44983
CVE-2024-44984
CVE-2024-44985
CVE-2024-44986
CVE-2024-44987
CVE-2024-44988
CVE-2024-44989
CVE-2024-44990
CVE-2024-44991
CVE-2024-44993
CVE-2024-44995
CVE-2024-44996
CVE-2024-44998
CVE-2024-44999
CVE-2024-45000
CVE-2024-45002
CVE-2024-45003
CVE-2024-45005
CVE-2024-45006
CVE-2024-45007
CVE-2024-45008
CVE-2024-45009
CVE-2024-45010
CVE-2024-45011
CVE-2024-45012
CVE-2024-45013
CVE-2024-45015
CVE-2024-45017
CVE-2024-45018
CVE-2024-45019
CVE-2024-45020
CVE-2024-45021
CVE-2024-45022
CVE-2024-45025
CVE-2024-45026
CVE-2024-45027
CVE-2024-45028
CVE-2024-45029
CVE-2024-45030
CVE-2024-46672
CVE-2024-46673
CVE-2024-46675
CVE-2024-46676
CVE-2024-46677
CVE-2024-46678
CVE-2024-46679
CVE-2024-46680
CVE-2024-46681
CVE-2024-46683
CVE-2024-46685
CVE-2024-46686
CVE-2024-46687
CVE-2024-46689
CVE-2024-46691
CVE-2024-46692
CVE-2024-46693
CVE-2024-46694
CVE-2024-46695
CVE-2024-46697
CVE-2024-46698
CVE-2024-46701
CVE-2024-46702
CVE-2024-46703
CVE-2024-46705
CVE-2024-46706
CVE-2024-46707
CVE-2024-46708
CVE-2024-46709
CVE-2024-46710
CVE-2024-46711
CVE-2024-46713
CVE-2024-46714
CVE-2024-46715
CVE-2024-46716
CVE-2024-46717
CVE-2024-46718
CVE-2024-46719
CVE-2024-46720
CVE-2024-46721
CVE-2024-46722
CVE-2024-46723
CVE-2024-46724
CVE-2024-46725
CVE-2024-46726
CVE-2024-46727
CVE-2024-46728
CVE-2024-46729
CVE-2024-46730
CVE-2024-46731
CVE-2024-46732
CVE-2024-46733
CVE-2024-46735
CVE-2024-46737
CVE-2024-46738
CVE-2024-46739
CVE-2024-46740
CVE-2024-46741
CVE-2024-46743
CVE-2024-46744
CVE-2024-46745
CVE-2024-46746
CVE-2024-46747
CVE-2024-46749
CVE-2024-46750
CVE-2024-46751
CVE-2024-46752
CVE-2024-46753
CVE-2024-46754
CVE-2024-46755
CVE-2024-46759
CVE-2024-46760
CVE-2024-46761
CVE-2024-46762
CVE-2024-46763
CVE-2024-46765
CVE-2024-46766
CVE-2024-46767
CVE-2024-46768
CVE-2024-46770
CVE-2024-46771
CVE-2024-46772
CVE-2024-46773
CVE-2024-46774
CVE-2024-46775
CVE-2024-46776
CVE-2024-46777
CVE-2024-46778
CVE-2024-46779
CVE-2024-46780
CVE-2024-46781
CVE-2024-46782
CVE-2024-46783
CVE-2024-46784
CVE-2024-46785
CVE-2024-46786
CVE-2024-46787
CVE-2024-46788
CVE-2024-46791
CVE-2024-46792
CVE-2024-46793
CVE-2024-46794
CVE-2024-46795
CVE-2024-46797
CVE-2024-46798
CVE-2024-46802
CVE-2024-46803
CVE-2024-46804
CVE-2024-46805
CVE-2024-46806
CVE-2024-46807
CVE-2024-46808
CVE-2024-46809
CVE-2024-46810
CVE-2024-46811
CVE-2024-46812
CVE-2024-46813
CVE-2024-46814
CVE-2024-46815
CVE-2024-46816
CVE-2024-46817
CVE-2024-46818
CVE-2024-46819
CVE-2024-46821
CVE-2024-46822
CVE-2024-46823
CVE-2024-46824
CVE-2024-46825
CVE-2024-46826
CVE-2024-46827
CVE-2024-46828
CVE-2024-46829
CVE-2024-46830
CVE-2024-46831
CVE-2024-46832
CVE-2024-46834
CVE-2024-46835
CVE-2024-46836
CVE-2024-46838
CVE-2024-46840
CVE-2024-46841
CVE-2024-46842
CVE-2024-46843
CVE-2024-46844
CVE-2024-46845
CVE-2024-46846
CVE-2024-46847
CVE-2024-46848
CVE-2024-46849
CVE-2024-46850
CVE-2024-46851
CVE-2024-46852
CVE-2024-46853
CVE-2024-46854
CVE-2024-46855
CVE-2024-46857
CVE-2024-46858
CVE-2024-46859
CVE-2024-46860
CVE-2024-46861
CVE-2024-46864
CVE-2024-46866
CVE-2024-46867
CVE-2024-46868
CVE-2024-46870
CVE-2024-46871
CVE-2024-47658
CVE-2024-47659
CVE-2024-47660
CVE-2024-47661
CVE-2024-47662
CVE-2024-47663
CVE-2024-47664
CVE-2024-47665
CVE-2024-47666
CVE-2024-47667
CVE-2024-47668
CVE-2024-47669
CVE-2024-47674
CVE-2024-47683
CVE-2024-49984
CVE-2024-50264
CVE-2024-53057
USN-7197-1 -- Go Networking vulnerability
Ubuntu 24.04 LTS
Guido Vranken discovered that Go Networking handled input to the Parse functions inefficiently. An attacker could possibly use this issue to cause denial of service. This update addresses the issue in the golang-golang-x-net and golang-golang-x-net-dev packages, as well as the library vendored within adsys and juju-core. Update Instructions: Run `sudo pro fix USN-7197-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: adsys - 0.14.3~24.04ubuntu0.1 adsys-windows - 0.14.3~24.04ubuntu0.1 No subscription required golang-golang-x-net-dev - 1:0.21.0+dfsg-1ubuntu0.1~esm1 No subscription required
Medium
CVE-2024-45338
USN-7199-1 -- xmltok library vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Expat, contained within the xmltok library, incorrectly handled malformed XML data. If a user or application were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code. (CVE-2015-1283, CVE-2016-0718, CVE-2016-4472, CVE-2019-15903) It was discovered that Expat, contained within the xmltok library, incorrectly handled XML data containing a large number of colons, which could lead to excessive resource consumption. If a user or application were tricked into opening a crafted XML file, an attacker could possibly use this issue to cause a denial of service. (CVE-2018-20843) It was discovered that Expat, contained within the xmltok library, incorrectly handled certain input, which could lead to an integer overflow. If a user or application were tricked into opening a crafted XML file, an attacker could possibly use this issue to cause a denial of service. (CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827) Update Instructions: Run `sudo pro fix USN-7199-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm2 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2015-1283
CVE-2016-0718
CVE-2016-4472
CVE-2018-20843
CVE-2019-15903
CVE-2021-46143
CVE-2022-22822
CVE-2022-22823
CVE-2022-22824
CVE-2022-22825
CVE-2022-22826
CVE-2022-22827
USN-7201-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7201-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.5-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.5-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.5-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.5-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.5-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-54479
CVE-2024-54502
CVE-2024-54505
CVE-2024-54508
USN-7204-1 -- NeoMutt vulnerabilities
Ubuntu 24.04 LTS
Jeriko One discovered that NeoMutt incorrectly handled certain IMAP and POP3 responses. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in a denial of service, or the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14349, CVE-2018-14350, CVE-2018-14351, CVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355, CVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359, CVE-2018-14362) Jeriko One discovered that NeoMutt incorrectly handled certain NNTP-related operations. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in denial of service, or the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14360, CVE-2018-14361, CVE-2018-14363) It was discovered that NeoMutt incorrectly processed additional data when communicating with mail servers. An attacker could possibly use this issue to access senstive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14954, CVE-2020-28896) It was discovered that Neomutt incorrectly handled the IMAP QRSync setting. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32055) Tavis Ormandy discovered that NeoMutt incorrectly parsed uuencoded text past the length of the string. An attacker could possibly use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1328) It was discovered that NeoMutt did not properly encrypt email headers. An attacker could possibly use this issue to receive emails that were not intended for them and access sensitive information. This vulnerability was only fixed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-49393, CVE-2024-49394) Update Instructions: Run `sudo pro fix USN-7204-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: neomutt - 20231103+dfsg1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2018-14349
CVE-2018-14350
CVE-2018-14351
CVE-2018-14352
CVE-2018-14353
CVE-2018-14354
CVE-2018-14355
CVE-2018-14356
CVE-2018-14357
CVE-2018-14358
CVE-2018-14359
CVE-2018-14360
CVE-2018-14361
CVE-2018-14362
CVE-2018-14363
CVE-2020-14954
CVE-2020-28896
CVE-2021-32055
CVE-2022-1328
CVE-2024-49393
CVE-2024-49394
USN-7205-1 -- Django vulnerability
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain IPv6 strings. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7205-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.5 python3-django - 3:4.2.11-1ubuntu1.5 No subscription required
Medium
CVE-2024-56374
USN-7206-1 -- rsync vulnerabilities
Ubuntu 24.04 LTS
Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync did not properly handle checksum lengths. An attacker could use this issue to execute arbitrary code. (CVE-2024-12084) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync compared checksums with uninitialized memory. An attacker could exploit this issue to leak sensitive information. (CVE-2024-12085) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync incorrectly handled file checksums. A malicious server could use this to expose arbitrary client files. (CVE-2024-12086) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync mishandled symlinks for some settings. An attacker could exploit this to write files outside the intended directory. (CVE-2024-12087) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync failed to verify symbolic link destinations for some settings. An attacker could exploit this for path traversal attacks. (CVE-2024-12088) Aleksei Gorban discovered a race condition in rsync's handling of symbolic links. An attacker could use this to access sensitive information or escalate privileges. (CVE-2024-12747) Update Instructions: Run `sudo pro fix USN-7206-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.2.7-1ubuntu1.1 No subscription required
High
CVE-2024-12084
CVE-2024-12085
CVE-2024-12086
CVE-2024-12087
CVE-2024-12088
CVE-2024-12747
USN-7206-2 -- rsync regression
Ubuntu 24.04 LTS
USN-7206-1 fixed vulnerabilities in rsync. The update introduced a regression in rsync. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync did not properly handle checksum lengths. An attacker could use this issue to execute arbitrary code. (CVE-2024-12084) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync compared checksums with uninitialized memory. An attacker could exploit this issue to leak sensitive information. (CVE-2024-12085) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync incorrectly handled file checksums. A malicious server could use this to expose arbitrary client files. (CVE-2024-12086) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync mishandled symlinks for some settings. An attacker could exploit this to write files outside the intended directory. (CVE-2024-12087) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync failed to verify symbolic link destinations for some settings. An attacker could exploit this for path traversal attacks. (CVE-2024-12088) Aleksei Gorban discovered a race condition in rsync's handling of symbolic links. An attacker could use this to access sensitive information or escalate privileges. (CVE-2024-12747) Update Instructions: Run `sudo pro fix USN-7206-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.2.7-1ubuntu1.2 No subscription required
None
https://launchpad.net/bugs/2095004
USN-7207-1 -- Git vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Git incorrectly handled certain URLs when asking for credentials. An attacker could possibly use this issue to mislead the user into typing passwords for trusted sites that would then be sent to untrusted sites instead. (CVE-2024-50349) It was discovered that git incorrectly handled line endings when using credential helpers. (CVE-2024-52006) Update Instructions: Run `sudo pro fix USN-7207-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.2 git-all - 1:2.43.0-1ubuntu7.2 git-cvs - 1:2.43.0-1ubuntu7.2 git-daemon-run - 1:2.43.0-1ubuntu7.2 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.2 git-doc - 1:2.43.0-1ubuntu7.2 git-email - 1:2.43.0-1ubuntu7.2 git-gui - 1:2.43.0-1ubuntu7.2 git-man - 1:2.43.0-1ubuntu7.2 git-mediawiki - 1:2.43.0-1ubuntu7.2 git-svn - 1:2.43.0-1ubuntu7.2 gitk - 1:2.43.0-1ubuntu7.2 gitweb - 1:2.43.0-1ubuntu7.2 No subscription required
Medium
CVE-2024-50349
CVE-2024-52006
USN-7210-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle input provided to its Convert.TryToHexString method. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21171) It was discovered that .NET did not properly handle an integer overflow when processing certain specially crafted files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21172) Daniel Plaisted and Noah Gilson discovered that .NET insecurely handled temporary file usage which could result in malicious package dependency injection. An attacker could possibly use this issue to elevate privileges. (CVE-2025-21173) It was discovered that .NET did not properly perform input data validation when processing certain specially crafted files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21176) Update Instructions: Run `sudo pro fix USN-7210-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.112-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.112-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.112-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.112-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.112-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.112-8.0.12-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.12-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.12-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2025-21171
CVE-2025-21172
CVE-2025-21173
CVE-2025-21176
USN-7213-1 -- poppler vulnerability
Ubuntu 24.04 LTS
It was discovered that poppler incorrectly handled memory when opening certain PDF files. An attacker could possibly use this issue to cause denial of service or obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7213-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.2 libpoppler-cpp-dev - 24.02.0-1ubuntu9.2 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.2 libpoppler-dev - 24.02.0-1ubuntu9.2 libpoppler-glib-dev - 24.02.0-1ubuntu9.2 libpoppler-glib-doc - 24.02.0-1ubuntu9.2 libpoppler-glib8t64 - 24.02.0-1ubuntu9.2 libpoppler-private-dev - 24.02.0-1ubuntu9.2 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.2 libpoppler-qt5-dev - 24.02.0-1ubuntu9.2 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.2 libpoppler-qt6-dev - 24.02.0-1ubuntu9.2 libpoppler134 - 24.02.0-1ubuntu9.2 poppler-utils - 24.02.0-1ubuntu9.2 No subscription required
Medium
CVE-2024-56378
USN-7216-1 -- tqdm vulnerability
Ubuntu 24.04 LTS
It was discovered that tqdm did not properly sanitize non-boolean CLI Arguments. A local attacker could possibly use this issue to execute arbitrary code on the host. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-34062) Update Instructions: Run `sudo pro fix USN-7216-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-tqdm - 4.66.2-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-34062
USN-7219-1 -- Python vulnerability
Ubuntu 24.04 LTS
It was discovered that Python incorrectly handled asyncio write buffers. A remote attacker could possibly use this issue to cause Python to consume memory, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7219-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.4 libpython3.12-dev - 3.12.3-1ubuntu0.4 libpython3.12-minimal - 3.12.3-1ubuntu0.4 libpython3.12-stdlib - 3.12.3-1ubuntu0.4 libpython3.12-testsuite - 3.12.3-1ubuntu0.4 libpython3.12t64 - 3.12.3-1ubuntu0.4 python3.12 - 3.12.3-1ubuntu0.4 python3.12-dev - 3.12.3-1ubuntu0.4 python3.12-doc - 3.12.3-1ubuntu0.4 python3.12-examples - 3.12.3-1ubuntu0.4 python3.12-full - 3.12.3-1ubuntu0.4 python3.12-minimal - 3.12.3-1ubuntu0.4 python3.12-nopie - 3.12.3-1ubuntu0.4 python3.12-venv - 3.12.3-1ubuntu0.4 No subscription required
Medium
CVE-2024-12254
USN-7220-1 -- Vim vulnerability
Ubuntu 24.04 LTS
It was discovered that Vim incorrectly handled memory when closing buffers with the visual mode active. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7220-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.6 vim-athena - 2:9.1.0016-1ubuntu7.6 vim-common - 2:9.1.0016-1ubuntu7.6 vim-doc - 2:9.1.0016-1ubuntu7.6 vim-gtk3 - 2:9.1.0016-1ubuntu7.6 vim-gui-common - 2:9.1.0016-1ubuntu7.6 vim-motif - 2:9.1.0016-1ubuntu7.6 vim-nox - 2:9.1.0016-1ubuntu7.6 vim-runtime - 2:9.1.0016-1ubuntu7.6 vim-tiny - 2:9.1.0016-1ubuntu7.6 xxd - 2:9.1.0016-1ubuntu7.6 No subscription required
Medium
CVE-2025-22134
USN-7221-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystem: - Bluetooth drivers; (CVE-2024-53238, CVE-2024-56757) Update Instructions: Run `sudo pro fix USN-7221-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1012-oem - 6.11.0-1012.12 linux-headers-6.11.0-1012-oem - 6.11.0-1012.12 linux-headers-oem-24.04b - 6.11.0-1012.12 linux-image-6.11.0-1012-oem - 6.11.0-1012.12 linux-image-oem-24.04b - 6.11.0-1012.12 linux-image-uc-6.11.0-1012-oem - 6.11.0-1012.12 linux-image-uc-oem-24.04b - 6.11.0-1012.12 linux-image-unsigned-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu6-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu6-oem-24.04b - 6.11.0-1012.12 linux-modules-ipu7-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu7-oem-24.04b - 6.11.0-1012.12 linux-modules-iwlwifi-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1012.12 linux-modules-usbio-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-usbio-oem-24.04b - 6.11.0-1012.12 linux-modules-vision-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-vision-oem-24.04b - 6.11.0-1012.12 linux-oem-24.04b - 6.11.0-1012.12 linux-oem-6.11-headers-6.11.0-1012 - 6.11.0-1012.12 linux-oem-6.11-tools-6.11.0-1012 - 6.11.0-1012.12 linux-tools-6.11.0-1012-oem - 6.11.0-1012.12 linux-tools-oem-24.04b - 6.11.0-1012.12 No subscription required
Medium
CVE-2024-53238
CVE-2024-56757
USN-7223-1 -- OpenJPEG vulnerabilities
Ubuntu 24.04 LTS
Frank Zeng discovered that OpenJPEG incorrectly handled memory when using the decompression utility. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-56826, CVE-2024-56827) Update Instructions: Run `sudo pro fix USN-7223-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.3 libopenjp2-7-dev - 2.5.0-2ubuntu0.3 libopenjp2-tools - 2.5.0-2ubuntu0.3 libopenjpip-dec-server - 2.5.0-2ubuntu0.3 libopenjpip-server - 2.5.0-2ubuntu0.3 libopenjpip-viewer - 2.5.0-2ubuntu0.3 libopenjpip7 - 2.5.0-2ubuntu0.3 openjpeg-doc - 2.5.0-2ubuntu0.3 No subscription required
Medium
CVE-2024-56826
CVE-2024-56827
USN-7224-1 -- Cyrus IMAP Server vulnerabilities
Ubuntu 24.04 LTS
It was discovered that non-authentication-related HTTP requests could be interpreted in an authentication context by a Cyrus IMAP Server when multiple requests arrived over the same connection. An unauthenticated attacker could possibly use this issue to perform a privilege escalation attack. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-18928) Matthew Horsfall discovered that Cyrus IMAP Server utilized a poor string hashing algorithm that could be abused to control where data was being stored. An attacker could possibly use this issue to perform a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-33582) Damian Poddebniak discovered that Cyrus IMAP Server could interpret specially crafted commands to exploit a memory issue. An authenticated attacker could possibly use this issue to perform a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-34055) Update Instructions: Run `sudo pro fix USN-7224-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cyrus-admin - 3.8.2-1ubuntu0.1~esm1 cyrus-caldav - 3.8.2-1ubuntu0.1~esm1 cyrus-clients - 3.8.2-1ubuntu0.1~esm1 cyrus-common - 3.8.2-1ubuntu0.1~esm1 cyrus-dev - 3.8.2-1ubuntu0.1~esm1 cyrus-doc - 3.8.2-1ubuntu0.1~esm1 cyrus-imapd - 3.8.2-1ubuntu0.1~esm1 cyrus-murder - 3.8.2-1ubuntu0.1~esm1 cyrus-nntpd - 3.8.2-1ubuntu0.1~esm1 cyrus-pop3d - 3.8.2-1ubuntu0.1~esm1 cyrus-replication - 3.8.2-1ubuntu0.1~esm1 libcyrus-imap-perl - 3.8.2-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2019-18928
CVE-2021-33582
CVE-2024-34055
USN-7225-1 -- HTMLDOC vulnerabilities
Ubuntu 24.04 LTS
It was discovered that HTMLDOC incorrectly handled memory in the image_set_mask, git_read_lzw, write_header and write_node functions, which could lead to a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0137, CVE-2022-24191, CVE-2022-34033, CVE-2022-34035) It was discovered that HTMLDOC incorrectly handled memory in the gif_get_code function, which could lead to a segmentation fault. If a user or application were tricked into opening a crafted GIF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0534) It was discovered that HTMLDOC did not perform proper bounds checks on image dimensions when loading JPEG images, which could lead to a buffer overflow. If a user or application were tricked into opening a crafted JPEG image, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27114) It was discovered that HTMLDOC incorrectly handled memory in the pdf_write_names function, which could lead to a heap buffer overflow. If a user or application were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or leak sensitive information. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-28085) It was discovered that HTMLDOC could be made to write out of bounds when attempting to strip whitespace. An attacker could use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-45508) It was discovered that HTMLDOC incorrectly handled memory in the parse_pre function, which could lead to a heap buffer overflow. If a user or application were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-46478) Update Instructions: Run `sudo pro fix USN-7225-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: htmldoc - 1.9.17-1ubuntu0.1~esm1 htmldoc-common - 1.9.17-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-0137
CVE-2022-0534
CVE-2022-24191
CVE-2022-27114
CVE-2022-28085
CVE-2022-34033
CVE-2022-34035
CVE-2024-45508
CVE-2024-46478
USN-7227-1 -- PCL vulnerability
Ubuntu 24.04 LTS
It was discovered that PCL incorrectly handled certain malformed files. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly exploit this to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7227-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpcl-apps1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-common1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-dev - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-doc - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-features1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-filters1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-io1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-kdtree1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-keypoints1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-ml1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-octree1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-outofcore1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-people1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-recognition1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-registration1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-sample-consensus1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-search1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-segmentation1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-stereo1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-surface1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-tracking1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-visualization1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 pcl-tools - 1.14.0+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-53432
USN-7228-1 -- LibreOffice vulnerabilities
Ubuntu 24.04 LTS
Thomas Rinsma discovered that LibreOffice incorrectly handled paths when processing embedded font files. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to create arbitrary files ending with ".ttf". (CVE-2024-12425) Thomas Rinsma discovered that LibreOffice incorrectly handled certain environment variables and INI file values. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to exfiltrate sensitive information. (CVE-2024-12426) Update Instructions: Run `sudo pro fix USN-7228-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.2 libjuh-java - 4:24.2.7-0ubuntu0.24.04.2 libjurt-java - 4:24.2.7-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.2 libreoffice - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.2 libridl-java - 4:24.2.7-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libunoil-java - 4:24.2.7-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.2 python3-access2base - 4:24.2.7-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.2 python3-uno - 4:24.2.7-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.2 ure - 4:24.2.7-0ubuntu0.24.04.2 ure-java - 4:24.2.7-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-12425
CVE-2024-12426
USN-7229-1 -- ClamAV vulnerability
Ubuntu 24.04 LTS
It was discovered that ClamAV incorrectly handled decrypting OLE2 content. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7229-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.8+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.8+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.8+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.8+dfsg-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-20128
USN-7230-2 -- FRR vulnerabilities
Ubuntu 24.04 LTS
Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2024-44070) It was discovered that FRR re-validated all routes in certain instances when the internal socket's buffer size overflowed. A remote attacker could possibly use this issue to impact the performance of FRR, resulting in a denial of service. (CVE-2024-55553) Update Instructions: Run `sudo pro fix USN-7230-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.3 frr-doc - 8.4.4-1.1ubuntu6.3 frr-pythontools - 8.4.4-1.1ubuntu6.3 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.3 frr-snmp - 8.4.4-1.1ubuntu6.3 No subscription required
Medium
CVE-2024-44070
CVE-2024-55553
USN-7231-1 -- Tcpreplay vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Tcpreplay incorrectly handled memory when using the tcprewrite utility. A remote attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-27783) It was discovered that Tcpreplay incorrectly validated external input. A remote attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-27784, CVE-2023-27785, CVE-2023-27786, CVE-2023-27787, CVE-2023-27788, CVE-2023-27789) It was discovered that Tcpreplay incorrectly handled memory when using the tcprewrite utility. An attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-4256, CVE-2023-43279) Update Instructions: Run `sudo pro fix USN-7231-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tcpreplay - 4.4.4-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-27783
CVE-2023-27784
CVE-2023-27785
CVE-2023-27786
CVE-2023-27787
CVE-2023-27788
CVE-2023-27789
CVE-2023-4256
CVE-2023-43279
USN-7236-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53164, CVE-2024-53103, CVE-2024-53141) Update Instructions: Run `sudo pro fix USN-7236-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-cloud-tools-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-cloud-tools-gkeop - 6.8.0-1004.6 linux-cloud-tools-gkeop-6.8 - 6.8.0-1004.6 linux-gkeop - 6.8.0-1004.6 linux-gkeop-6.8 - 6.8.0-1004.6 linux-gkeop-cloud-tools-6.8.0-1004 - 6.8.0-1004.6 linux-gkeop-headers-6.8.0-1004 - 6.8.0-1004.6 linux-gkeop-tools-6.8.0-1004 - 6.8.0-1004.6 linux-headers-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-headers-gkeop - 6.8.0-1004.6 linux-headers-gkeop-6.8 - 6.8.0-1004.6 linux-image-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-image-gkeop - 6.8.0-1004.6 linux-image-gkeop-6.8 - 6.8.0-1004.6 linux-image-unsigned-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-extra-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-extra-gkeop - 6.8.0-1004.6 linux-modules-extra-gkeop-6.8 - 6.8.0-1004.6 linux-tools-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-tools-gkeop - 6.8.0-1004.6 linux-tools-gkeop-6.8 - 6.8.0-1004.6 No subscription required linux-buildinfo-6.8.0-1017-gke - 6.8.0-1017.21 linux-gke - 6.8.0-1017.21 linux-gke-headers-6.8.0-1017 - 6.8.0-1017.21 linux-gke-tools-6.8.0-1017 - 6.8.0-1017.21 linux-headers-6.8.0-1017-gke - 6.8.0-1017.21 linux-headers-gke - 6.8.0-1017.21 linux-image-6.8.0-1017-gke - 6.8.0-1017.21 linux-image-gke - 6.8.0-1017.21 linux-image-unsigned-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-extra-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-iwlwifi-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-iwlwifi-gke - 6.8.0-1017.21 linux-tools-6.8.0-1017-gke - 6.8.0-1017.21 linux-tools-gke - 6.8.0-1017.21 No subscription required linux-buildinfo-6.8.0-1018-raspi - 6.8.0-1018.20 linux-headers-6.8.0-1018-raspi - 6.8.0-1018.20 linux-headers-raspi - 6.8.0-1018.20 linux-image-6.8.0-1018-raspi - 6.8.0-1018.20 linux-image-raspi - 6.8.0-1018.20 linux-modules-6.8.0-1018-raspi - 6.8.0-1018.20 linux-raspi - 6.8.0-1018.20 linux-raspi-headers-6.8.0-1018 - 6.8.0-1018.20 linux-raspi-tools-6.8.0-1018 - 6.8.0-1018.20 linux-tools-6.8.0-1018-raspi - 6.8.0-1018.20 linux-tools-raspi - 6.8.0-1018.20 No subscription required linux-buildinfo-6.8.0-1019-ibm - 6.8.0-1019.19 linux-headers-6.8.0-1019-ibm - 6.8.0-1019.19 linux-headers-ibm - 6.8.0-1019.19 linux-headers-ibm-classic - 6.8.0-1019.19 linux-headers-ibm-lts-24.04 - 6.8.0-1019.19 linux-ibm - 6.8.0-1019.19 linux-ibm-classic - 6.8.0-1019.19 linux-ibm-cloud-tools-common - 6.8.0-1019.19 linux-ibm-headers-6.8.0-1019 - 6.8.0-1019.19 linux-ibm-lts-24.04 - 6.8.0-1019.19 linux-ibm-source-6.8.0 - 6.8.0-1019.19 linux-ibm-tools-6.8.0-1019 - 6.8.0-1019.19 linux-image-6.8.0-1019-ibm - 6.8.0-1019.19 linux-image-ibm - 6.8.0-1019.19 linux-image-ibm-classic - 6.8.0-1019.19 linux-image-ibm-lts-24.04 - 6.8.0-1019.19 linux-image-unsigned-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-extra-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-ibm-classic - 6.8.0-1019.19 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1019.19 linux-tools-6.8.0-1019-ibm - 6.8.0-1019.19 linux-tools-ibm - 6.8.0-1019.19 linux-tools-ibm-classic - 6.8.0-1019.19 linux-tools-ibm-lts-24.04 - 6.8.0-1019.19 No subscription required linux-buildinfo-6.8.0-1019-oracle - 6.8.0-1019.20 linux-buildinfo-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-headers-6.8.0-1019-oracle - 6.8.0-1019.20 linux-headers-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-headers-oracle - 6.8.0-1019.20 linux-headers-oracle-64k - 6.8.0-1019.20 linux-image-6.8.0-1019-oracle - 6.8.0-1019.20 linux-image-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-image-oracle - 6.8.0-1019.20 linux-image-oracle-64k - 6.8.0-1019.20 linux-image-unsigned-6.8.0-1019-oracle - 6.8.0-1019.20 linux-image-unsigned-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-modules-6.8.0-1019-oracle - 6.8.0-1019.20 linux-modules-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-modules-extra-6.8.0-1019-oracle - 6.8.0-1019.20 linux-modules-extra-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-oracle - 6.8.0-1019.20 linux-oracle-64k - 6.8.0-1019.20 linux-oracle-headers-6.8.0-1019 - 6.8.0-1019.20 linux-oracle-tools-6.8.0-1019 - 6.8.0-1019.20 linux-tools-6.8.0-1019-oracle - 6.8.0-1019.20 linux-tools-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-tools-oracle - 6.8.0-1019.20 linux-tools-oracle-64k - 6.8.0-1019.20 No subscription required linux-buildinfo-6.8.0-1021-gcp - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-cloud-tools-nvidia - 6.8.0-1021.23 linux-gcp - 6.8.0-1021.23 linux-gcp-headers-6.8.0-1021 - 6.8.0-1021.23 linux-gcp-tools-6.8.0-1021 - 6.8.0-1021.23 linux-headers-6.8.0-1021-gcp - 6.8.0-1021.23 linux-headers-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-headers-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-headers-gcp - 6.8.0-1021.23 linux-headers-nvidia - 6.8.0-1021.23 linux-headers-nvidia-64k - 6.8.0-1021.23 linux-image-6.8.0-1021-gcp - 6.8.0-1021.23 linux-image-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-image-gcp - 6.8.0-1021.23 linux-image-nvidia - 6.8.0-1021.23 linux-image-nvidia-64k - 6.8.0-1021.23 linux-image-uc-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-uc-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-gcp - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-6.8.0-1021-gcp - 6.8.0-1021.23 linux-modules-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-gcp - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-extra-gcp - 6.8.0-1021.23 linux-modules-nvidia-fs-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-nvidia-fs-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-nvidia-fs-nvidia - 6.8.0-1021.23 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1021.23 linux-nvidia - 6.8.0-1021.23 linux-nvidia-64k - 6.8.0-1021.23 linux-nvidia-headers-6.8.0-1021 - 6.8.0-1021.23 linux-nvidia-tools-6.8.0-1021 - 6.8.0-1021.23 linux-tools-6.8.0-1021-gcp - 6.8.0-1021.23 linux-tools-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-tools-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-tools-gcp - 6.8.0-1021.23 linux-tools-nvidia - 6.8.0-1021.23 linux-tools-nvidia-64k - 6.8.0-1021.23 No subscription required linux-buildinfo-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-buildinfo-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-headers-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-uc-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-uc-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-unsigned-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-unsigned-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-extra-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-nvidia-lowlatency - 6.8.0-1021.23.1 linux-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-nvidia-lowlatency-headers-6.8.0-1021 - 6.8.0-1021.23.1 linux-nvidia-lowlatency-tools-6.8.0-1021 - 6.8.0-1021.23.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1021.23.1 linux-tools-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-tools-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-tools-nvidia-lowlatency - 6.8.0-1021.23.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1021.23.1 No subscription required linux-azure - 6.8.0-1021.25 linux-azure-cloud-tools-6.8.0-1021 - 6.8.0-1021.25 linux-azure-fde - 6.8.0-1021.25 linux-azure-headers-6.8.0-1021 - 6.8.0-1021.25 linux-azure-tools-6.8.0-1021 - 6.8.0-1021.25 linux-buildinfo-6.8.0-1021-azure - 6.8.0-1021.25 linux-cloud-tools-6.8.0-1021-azure - 6.8.0-1021.25 linux-cloud-tools-azure - 6.8.0-1021.25 linux-headers-6.8.0-1021-azure - 6.8.0-1021.25 linux-headers-azure - 6.8.0-1021.25 linux-image-6.8.0-1021-azure - 6.8.0-1021.25 linux-image-6.8.0-1021-azure-fde - 6.8.0-1021.25 linux-image-azure - 6.8.0-1021.25 linux-image-azure-fde - 6.8.0-1021.25 linux-image-unsigned-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-extra-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-extra-azure - 6.8.0-1021.25 linux-modules-involflt-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-involflt-azure - 6.8.0-1021.25 linux-modules-iwlwifi-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-iwlwifi-azure - 6.8.0-1021.25 linux-tools-6.8.0-1021-azure - 6.8.0-1021.25 linux-tools-azure - 6.8.0-1021.25 No subscription required linux-buildinfo-6.8.0-52-generic - 6.8.0-52.53 linux-buildinfo-6.8.0-52-generic-64k - 6.8.0-52.53 linux-cloud-tools-6.8.0-52 - 6.8.0-52.53 linux-cloud-tools-6.8.0-52-generic - 6.8.0-52.53 linux-cloud-tools-common - 6.8.0-52.53 linux-cloud-tools-generic - 6.8.0-52.53 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-52.53 linux-cloud-tools-virtual - 6.8.0-52.53 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-52.53 linux-crashdump - 6.8.0-52.53 linux-doc - 6.8.0-52.53 linux-generic - 6.8.0-52.53 linux-generic-64k - 6.8.0-52.53 linux-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-generic-hwe-24.04 - 6.8.0-52.53 linux-generic-lpae - 6.8.0-52.53 linux-headers-6.8.0-52 - 6.8.0-52.53 linux-headers-6.8.0-52-generic - 6.8.0-52.53 linux-headers-6.8.0-52-generic-64k - 6.8.0-52.53 linux-headers-generic - 6.8.0-52.53 linux-headers-generic-64k - 6.8.0-52.53 linux-headers-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-headers-generic-hwe-24.04 - 6.8.0-52.53 linux-headers-generic-lpae - 6.8.0-52.53 linux-headers-kvm - 6.8.0-52.53 linux-headers-laptop-23.10 - 6.8.0-52.53 linux-headers-oem-20.04 - 6.8.0-52.53 linux-headers-oem-20.04b - 6.8.0-52.53 linux-headers-oem-20.04c - 6.8.0-52.53 linux-headers-oem-20.04d - 6.8.0-52.53 linux-headers-oem-22.04 - 6.8.0-52.53 linux-headers-virtual - 6.8.0-52.53 linux-headers-virtual-hwe-24.04 - 6.8.0-52.53 linux-image-6.8.0-52-generic - 6.8.0-52.53 linux-image-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-extra-virtual - 6.8.0-52.53 linux-image-extra-virtual-hwe-24.04 - 6.8.0-52.53 linux-image-generic - 6.8.0-52.53 linux-image-generic-64k - 6.8.0-52.53 linux-image-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-image-generic-hwe-24.04 - 6.8.0-52.53 linux-image-generic-lpae - 6.8.0-52.53 linux-image-kvm - 6.8.0-52.53 linux-image-laptop-23.10 - 6.8.0-52.53 linux-image-oem-20.04 - 6.8.0-52.53 linux-image-oem-20.04b - 6.8.0-52.53 linux-image-oem-20.04c - 6.8.0-52.53 linux-image-oem-20.04d - 6.8.0-52.53 linux-image-oem-22.04 - 6.8.0-52.53 linux-image-uc-6.8.0-52-generic - 6.8.0-52.53 linux-image-uc-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-uc-generic - 6.8.0-52.53 linux-image-uc-generic-hwe-24.04 - 6.8.0-52.53 linux-image-unsigned-6.8.0-52-generic - 6.8.0-52.53 linux-image-unsigned-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-virtual - 6.8.0-52.53 linux-image-virtual-hwe-24.04 - 6.8.0-52.53 linux-kvm - 6.8.0-52.53 linux-laptop-23.10 - 6.8.0-52.53 linux-lib-rust-6.8.0-52-generic - 6.8.0-52.53 linux-libc-dev - 6.8.0-52.53 linux-modules-6.8.0-52-generic - 6.8.0-52.53 linux-modules-6.8.0-52-generic-64k - 6.8.0-52.53 linux-modules-extra-6.8.0-52-generic - 6.8.0-52.53 linux-modules-ipu6-6.8.0-52-generic - 6.8.0-52.53 linux-modules-ipu6-generic - 6.8.0-52.53 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-52.53 linux-modules-iwlwifi-6.8.0-52-generic - 6.8.0-52.53 linux-modules-iwlwifi-generic - 6.8.0-52.53 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-52.53 linux-modules-iwlwifi-oem-20.04 - 6.8.0-52.53 linux-modules-iwlwifi-oem-20.04d - 6.8.0-52.53 linux-modules-iwlwifi-oem-22.04 - 6.8.0-52.53 linux-modules-usbio-6.8.0-52-generic - 6.8.0-52.53 linux-modules-usbio-generic - 6.8.0-52.53 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-52.53 linux-oem-20.04 - 6.8.0-52.53 linux-oem-20.04b - 6.8.0-52.53 linux-oem-20.04c - 6.8.0-52.53 linux-oem-20.04d - 6.8.0-52.53 linux-oem-22.04 - 6.8.0-52.53 linux-source - 6.8.0-52.53 linux-source-6.8.0 - 6.8.0-52.53 linux-tools-6.8.0-52 - 6.8.0-52.53 linux-tools-6.8.0-52-generic - 6.8.0-52.53 linux-tools-6.8.0-52-generic-64k - 6.8.0-52.53 linux-tools-common - 6.8.0-52.53 linux-tools-generic - 6.8.0-52.53 linux-tools-generic-64k - 6.8.0-52.53 linux-tools-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-tools-generic-hwe-24.04 - 6.8.0-52.53 linux-tools-generic-lpae - 6.8.0-52.53 linux-tools-host - 6.8.0-52.53 linux-tools-kvm - 6.8.0-52.53 linux-tools-laptop-23.10 - 6.8.0-52.53 linux-tools-oem-20.04 - 6.8.0-52.53 linux-tools-oem-20.04b - 6.8.0-52.53 linux-tools-oem-20.04c - 6.8.0-52.53 linux-tools-oem-20.04d - 6.8.0-52.53 linux-tools-oem-22.04 - 6.8.0-52.53 linux-tools-virtual - 6.8.0-52.53 linux-tools-virtual-hwe-24.04 - 6.8.0-52.53 linux-virtual - 6.8.0-52.53 linux-virtual-hwe-24.04 - 6.8.0-52.53 No subscription required linux-buildinfo-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-buildinfo-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-cloud-tools-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-cloud-tools-lowlatency - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-headers-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-headers-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-headers-lowlatency - 6.8.0-52.53.1 linux-headers-lowlatency-64k - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-image-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-image-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-image-lowlatency - 6.8.0-52.53.1 linux-image-lowlatency-64k - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-image-unsigned-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-image-unsigned-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-lowlatency - 6.8.0-52.53.1 linux-lowlatency-64k - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-lowlatency-cloud-tools-6.8.0-52 - 6.8.0-52.53.1 linux-lowlatency-headers-6.8.0-52 - 6.8.0-52.53.1 linux-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-lowlatency-lib-rust-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-lowlatency-tools-6.8.0-52 - 6.8.0-52.53.1 linux-modules-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-modules-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-modules-iwlwifi-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-modules-iwlwifi-lowlatency - 6.8.0-52.53.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-tools-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-tools-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-tools-lowlatency - 6.8.0-52.53.1 linux-tools-lowlatency-64k - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-52.53.1 No subscription required
High
CVE-2024-53103
CVE-2024-53141
CVE-2024-53164
USN-7237-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-47715, CVE-2024-53103, CVE-2024-53164, CVE-2024-53141) Update Instructions: Run `sudo pro fix USN-7237-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-oem - 6.8.0-1020.20 linux-headers-6.8.0-1020-oem - 6.8.0-1020.20 linux-headers-oem-24.04 - 6.8.0-1020.20 linux-headers-oem-24.04a - 6.8.0-1020.20 linux-image-6.8.0-1020-oem - 6.8.0-1020.20 linux-image-oem-24.04 - 6.8.0-1020.20 linux-image-oem-24.04a - 6.8.0-1020.20 linux-image-uc-6.8.0-1020-oem - 6.8.0-1020.20 linux-image-uc-oem-24.04 - 6.8.0-1020.20 linux-image-uc-oem-24.04a - 6.8.0-1020.20 linux-image-unsigned-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-ipu6-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-ipu6-oem-24.04 - 6.8.0-1020.20 linux-modules-ipu6-oem-24.04a - 6.8.0-1020.20 linux-modules-iwlwifi-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1020.20 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1020.20 linux-modules-usbio-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-usbio-oem-24.04 - 6.8.0-1020.20 linux-modules-usbio-oem-24.04a - 6.8.0-1020.20 linux-oem-24.04 - 6.8.0-1020.20 linux-oem-24.04a - 6.8.0-1020.20 linux-oem-6.8-headers-6.8.0-1020 - 6.8.0-1020.20 linux-oem-6.8-tools-6.8.0-1020 - 6.8.0-1020.20 linux-tools-6.8.0-1020-oem - 6.8.0-1020.20 linux-tools-oem-24.04 - 6.8.0-1020.20 linux-tools-oem-24.04a - 6.8.0-1020.20 No subscription required
High
CVE-2024-47715
CVE-2024-53103
CVE-2024-53141
CVE-2024-53164
USN-7238-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2024-53103, CVE-2024-53164) Update Instructions: Run `sudo pro fix USN-7238-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1013-oem - 6.11.0-1013.13 linux-headers-6.11.0-1013-oem - 6.11.0-1013.13 linux-headers-oem-24.04b - 6.11.0-1013.13 linux-image-6.11.0-1013-oem - 6.11.0-1013.13 linux-image-oem-24.04b - 6.11.0-1013.13 linux-image-uc-6.11.0-1013-oem - 6.11.0-1013.13 linux-image-uc-oem-24.04b - 6.11.0-1013.13 linux-image-unsigned-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu6-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu6-oem-24.04b - 6.11.0-1013.13 linux-modules-ipu7-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu7-oem-24.04b - 6.11.0-1013.13 linux-modules-iwlwifi-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1013.13 linux-modules-usbio-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-usbio-oem-24.04b - 6.11.0-1013.13 linux-modules-vision-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-vision-oem-24.04b - 6.11.0-1013.13 linux-oem-24.04b - 6.11.0-1013.13 linux-oem-6.11-headers-6.11.0-1013 - 6.11.0-1013.13 linux-oem-6.11-tools-6.11.0-1013 - 6.11.0-1013.13 linux-tools-6.11.0-1013-oem - 6.11.0-1013.13 linux-tools-oem-24.04b - 6.11.0-1013.13 No subscription required
High
CVE-2024-53103
CVE-2024-53164
USN-7240-1 -- libxml2 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could use this issue to cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-49043) It was discovered that the libxml2 xmllint tool incorrectly handled certain memory operations. If a user or automated system were tricked into running xmllint on a specially crafted xml file, a remote attacker could cause xmllint to crash, resulting in a denial of service. (CVE-2024-34459) Update Instructions: Run `sudo pro fix USN-7240-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.1 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.1 No subscription required
Medium
CVE-2022-49043
CVE-2024-34459
USN-7241-1 -- Bind vulnerabilities
Ubuntu 24.04 LTS
Toshifumi Sakaguchi discovered that Bind incorrectly handled many records in the additional section. A remote attacker could possibly use this issue to cause Bind to consume CPU resources, leading to a denial of service. (CVE-2024-11187) Jean-François Billaud discovered that the Bind DNS-over-HTTPS implementation incorrectly handled a heavy query load. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-12705) Update Instructions: Run `sudo pro fix USN-7241-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.30-0ubuntu0.24.04.2 bind9-dev - 1:9.18.30-0ubuntu0.24.04.2 bind9-dnsutils - 1:9.18.30-0ubuntu0.24.04.2 bind9-doc - 1:9.18.30-0ubuntu0.24.04.2 bind9-host - 1:9.18.30-0ubuntu0.24.04.2 bind9-libs - 1:9.18.30-0ubuntu0.24.04.2 bind9-utils - 1:9.18.30-0ubuntu0.24.04.2 bind9utils - 1:9.18.30-0ubuntu0.24.04.2 dnsutils - 1:9.18.30-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-11187
CVE-2024-12705
USN-7243-1 -- VLC vulnerability
Ubuntu 24.04 LTS
It was discovered that VLC incorrectly handled memory when reading an MMS stream. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7243-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvlc-bin - 3.0.20-3ubuntu0.1~esm1 libvlc-dev - 3.0.20-3ubuntu0.1~esm1 libvlc5 - 3.0.20-3ubuntu0.1~esm1 libvlccore-dev - 3.0.20-3ubuntu0.1~esm1 libvlccore9 - 3.0.20-3ubuntu0.1~esm1 vlc - 3.0.20-3ubuntu0.1~esm1 vlc-bin - 3.0.20-3ubuntu0.1~esm1 vlc-data - 3.0.20-3ubuntu0.1~esm1 vlc-l10n - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-access-extra - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-base - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-fluidsynth - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-jack - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-notify - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-qt - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-samba - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-skins2 - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-svg - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-video-output - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-video-splitter - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-visualization - 3.0.20-3ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-46461
USN-7244-1 -- Jinja2 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Jinja2 incorrectly handled certain filenames when compiling template content. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56201) It was discovered that Jinja2 incorrectly handled string formatting calls. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56326) Update Instructions: Run `sudo pro fix USN-7244-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.2 python3-jinja2 - 3.1.2-1ubuntu1.2 No subscription required
Medium
CVE-2024-56201
CVE-2024-56326
USN-7245-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.41 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-41.html https://www.oracle.com/security-alerts/cpujan2025.html Update Instructions: Run `sudo pro fix USN-7245-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.41-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.41-0ubuntu0.24.04.1 mysql-client - 8.0.41-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-router - 8.0.41-0ubuntu0.24.04.1 mysql-server - 8.0.41-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-testsuite - 8.0.41-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.41-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-21490
CVE-2025-21491
CVE-2025-21497
CVE-2025-21500
CVE-2025-21501
CVE-2025-21503
CVE-2025-21505
CVE-2025-21518
CVE-2025-21519
CVE-2025-21522
CVE-2025-21523
CVE-2025-21529
CVE-2025-21540
CVE-2025-21546
CVE-2025-21555
CVE-2025-21559
USN-7252-1 -- OpenJDK 11 vulnerability
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 11 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7252-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.26+4-1ubuntu1~24.04 openjdk-11-doc - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jdk - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre-headless - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre-zero - 11.0.26+4-1ubuntu1~24.04 openjdk-11-source - 11.0.26+4-1ubuntu1~24.04 No subscription required
Medium
CVE-2025-21502
USN-7253-1 -- OpenJDK 17 vulnerability
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 17 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7253-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.14+7-1~24.04 openjdk-17-doc - 17.0.14+7-1~24.04 openjdk-17-jdk - 17.0.14+7-1~24.04 openjdk-17-jdk-headless - 17.0.14+7-1~24.04 openjdk-17-jre - 17.0.14+7-1~24.04 openjdk-17-jre-headless - 17.0.14+7-1~24.04 openjdk-17-jre-zero - 17.0.14+7-1~24.04 openjdk-17-source - 17.0.14+7-1~24.04 No subscription required
Medium
CVE-2025-21502
USN-7254-1 -- OpenJDK 21 vulnerability
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 21 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7254-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.6+7-1~24.04.1 openjdk-21-doc - 21.0.6+7-1~24.04.1 openjdk-21-jdk - 21.0.6+7-1~24.04.1 openjdk-21-jdk-headless - 21.0.6+7-1~24.04.1 openjdk-21-jre - 21.0.6+7-1~24.04.1 openjdk-21-jre-headless - 21.0.6+7-1~24.04.1 openjdk-21-jre-zero - 21.0.6+7-1~24.04.1 openjdk-21-source - 21.0.6+7-1~24.04.1 openjdk-21-testsupport - 21.0.6+7-1~24.04.1 No subscription required
Medium
CVE-2025-21502
USN-7257-1 -- Kerberos vulnerability
Ubuntu 24.04 LTS
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces support for the Message-Authenticator attribute in non-EAP authentication methods for communications between Kerberos and a RADIUS server. Update Instructions: Run `sudo pro fix USN-7257-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.3 krb5-doc - 1.20.1-6ubuntu2.3 krb5-gss-samples - 1.20.1-6ubuntu2.3 krb5-k5tls - 1.20.1-6ubuntu2.3 krb5-kdc - 1.20.1-6ubuntu2.3 krb5-kdc-ldap - 1.20.1-6ubuntu2.3 krb5-kpropd - 1.20.1-6ubuntu2.3 krb5-locales - 1.20.1-6ubuntu2.3 krb5-multidev - 1.20.1-6ubuntu2.3 krb5-otp - 1.20.1-6ubuntu2.3 krb5-pkinit - 1.20.1-6ubuntu2.3 krb5-user - 1.20.1-6ubuntu2.3 libgssapi-krb5-2 - 1.20.1-6ubuntu2.3 libgssrpc4t64 - 1.20.1-6ubuntu2.3 libk5crypto3 - 1.20.1-6ubuntu2.3 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.3 libkadm5srv-mit12 - 1.20.1-6ubuntu2.3 libkdb5-10t64 - 1.20.1-6ubuntu2.3 libkrad-dev - 1.20.1-6ubuntu2.3 libkrad0 - 1.20.1-6ubuntu2.3 libkrb5-3 - 1.20.1-6ubuntu2.3 libkrb5-dev - 1.20.1-6ubuntu2.3 libkrb5support0 - 1.20.1-6ubuntu2.3 No subscription required
Medium
CVE-2024-3596
USN-7258-1 -- CKEditor vulnerabilities
Ubuntu 24.04 LTS
Kevin Backhouse discovered that CKEditor did not properly sanitize HTML content. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24728) It was discovered that CKEditor did not properly handle the creation of editor instances in the Iframe Dialog and Media Embed packages. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28439) It was discovered that CKEditor did not properly handle parsing HTML content. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. (CVE-2024-24815, CVE-2024-24816) It was discovered that CKEditor did not properly sanitize version notifications. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-43411) Update Instructions: Run `sudo pro fix USN-7258-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ckeditor - 4.22.1+dfsg1-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-24728
CVE-2023-28439
CVE-2024-24815
CVE-2024-24816
CVE-2024-43411
USN-7259-1 -- GNU C Library vulnerability
Ubuntu 24.04 LTS
It was discovered that GNU C Library incorrectly handled memory when using the assert function. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7259-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.39-0ubuntu8.4 glibc-source - 2.39-0ubuntu8.4 libc-bin - 2.39-0ubuntu8.4 libc-dev-bin - 2.39-0ubuntu8.4 libc-devtools - 2.39-0ubuntu8.4 libc6 - 2.39-0ubuntu8.4 libc6-amd64 - 2.39-0ubuntu8.4 libc6-dev - 2.39-0ubuntu8.4 libc6-dev-amd64 - 2.39-0ubuntu8.4 libc6-dev-i386 - 2.39-0ubuntu8.4 libc6-dev-s390 - 2.39-0ubuntu8.4 libc6-dev-x32 - 2.39-0ubuntu8.4 libc6-i386 - 2.39-0ubuntu8.4 libc6-s390 - 2.39-0ubuntu8.4 libc6-x32 - 2.39-0ubuntu8.4 locales - 2.39-0ubuntu8.4 locales-all - 2.39-0ubuntu8.4 nscd - 2.39-0ubuntu8.4 No subscription required
Medium
CVE-2025-0395
USN-7260-1 -- OpenRefine vulnerabilities
Ubuntu 24.04 LTS
It was discovered that OpenRefine did not properly handle opening tar files. If a user or application were tricked into opening a crafted tar file, an attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-37476) It was discovered that OpenRefine incorrectly handled file permissions and user authentication. An unauthenticated attacker could possibly use this issue to leak sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-41886, CVE-2023-41887) It was discovered that OpenRefine did not properly disallow database settings to be modified when queried. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-23833) It was discovered that OpenRefine did not properly sanitize the GET parameter for authorized commands, leading to a cross site scripting vulnerability. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47878) It was discovered that OpenRefine did not properly prevent cross-site request forgery when running the preview-expression command. If a user or application were tricked into opening a specially crafted webpage, an attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47879) It was discovered that OpenRefine did not properly handle HTTP headers. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47880) It was discovered that OpenRefine incorrectly handled database extensions. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47881) It was discovered that OpenRefine did not properly escape HTML tags in exception messages, which could enable code injection. If a user or application were tricked into opening a malicious file, an attacker could use this issue to execute arbitrary code. (CVE-2024-47882) It was discovered that OpenRefine did not correctly handle paths when executing the load-language command. An attacker could possibly use this issue to leak sensitive information. (CVE-2024-49760) Update Instructions: Run `sudo pro fix USN-7260-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openrefine - 3.7.7-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-37476
CVE-2023-41886
CVE-2023-41887
CVE-2024-23833
CVE-2024-47878
CVE-2024-47879
CVE-2024-47880
CVE-2024-47881
CVE-2024-47882
CVE-2024-49760
USN-7261-2 -- Vim vulnerability
Ubuntu 24.04 LTS
USN-7261-1 fixed vulnerabilities in Vim. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Vim incorrectly handled certain internal calls when scrolling a window. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7261-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.7 vim-athena - 2:9.1.0016-1ubuntu7.7 vim-common - 2:9.1.0016-1ubuntu7.7 vim-doc - 2:9.1.0016-1ubuntu7.7 vim-gtk3 - 2:9.1.0016-1ubuntu7.7 vim-gui-common - 2:9.1.0016-1ubuntu7.7 vim-motif - 2:9.1.0016-1ubuntu7.7 vim-nox - 2:9.1.0016-1ubuntu7.7 vim-runtime - 2:9.1.0016-1ubuntu7.7 vim-tiny - 2:9.1.0016-1ubuntu7.7 xxd - 2:9.1.0016-1ubuntu7.7 No subscription required
Medium
CVE-2025-24014
USN-7267-2 -- libsndfile vulnerability
Ubuntu 24.04 LTS
USN-7267-1 fixed a vulnerability in libsndfile. This update provides the corresponding updates for Ubuntu 24.04 LTS and Ubuntu 24.10. Original advisory details: It was discovered that libsndfile incorrectly handled certain malformed OggVorbis files. An attacker could possibly use this issue to cause libsndfile to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7267-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsndfile1 - 1.2.2-1ubuntu5.24.04.1 libsndfile1-dev - 1.2.2-1ubuntu5.24.04.1 sndfile-programs - 1.2.2-1ubuntu5.24.04.1 No subscription required
Low
CVE-2024-50612
USN-7269-2 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
USN-7269-1 fixed vulnerabilities in Intel Microcode. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel® Processors did not properly implement Finite State Machines (FSMs) in Hardware Logic. A local privileged attacker could use this issue to cause a denial of service. (CVE-2024-31068) It was discovered that some Intel® Processors with Intel® SGX did not properly restrict access to the EDECCSSA user leaf function. A local authenticated attacker could use this issue to cause a denial of service. (CVE-2024-36293) Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the UEFI firmware for some Intel® processors did not properly restrict access. An authenticated local attacker could use this issue to cause a denial of service. (CVE-2024-39279) Update Instructions: Run `sudo pro fix USN-7269-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250211.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-31068
CVE-2024-36293
CVE-2024-39279
USN-7270-1 -- OpenSSH vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465) It was discovered that OpenSSH incorrectly handled the transport-level ping facility. A remote attacker could possibly use this issue to cause OpenSSH clients and servers to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-26466) Update Instructions: Run `sudo pro fix USN-7270-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.8 openssh-server - 1:9.6p1-3ubuntu13.8 openssh-sftp-server - 1:9.6p1-3ubuntu13.8 openssh-tests - 1:9.6p1-3ubuntu13.8 ssh - 1:9.6p1-3ubuntu13.8 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.8 No subscription required
Medium
CVE-2025-26465
CVE-2025-26466
USN-7271-2 -- virtualenv vulnerability
Ubuntu 24.04 LTS
USN-7271-1 fixed a vulnerability in virtualenv. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that virtualenv incorrectly handled paths when activating virtual environments. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7271-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-virtualenv - 20.25.0+ds-2ubuntu0.1~esm1 virtualenv - 20.25.0+ds-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-53899
USN-7272-1 -- Symfony vulnerabilities
Ubuntu 24.04 LTS
Soner Sayakci discovered that Symfony incorrectly handled cookie storage in the web cache. An attacker could possibly use this issue to obtain sensitive information and access unauthorized resources. (CVE-2022-24894) Marco Squarcina discovered that Symfony incorrectly handled the storage of user session information. An attacker could possibly use this issue to perform a cross-site request forgery (CSRF) attack. (CVE-2022-24895) Pierre Rudloff discovered that Symfony incorrectly checked HTML input. An attacker could possibly use this issue to perform cross site scripting. (CVE-2023-46734) Vladimir Dusheyko discovered that Symfony incorrectly sanitized special input with a PHP directive in URL query strings. An attacker could possibly use this issue to expose sensitive information or cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50340) Oleg Andreyev, Antoine Makdessi, and Moritz Rauch discovered that Symfony incorrectly handled user authentication. An attacker could possibly use this issue to access unauthorized resources and expose sensitive information. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-50341, CVE-2024-51996) Linus Karlsson and Chris Smith discovered that Symfony returned internal host information during host resolution. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50342) It was discovered that Symfony incorrectly parsed user input through regular expressions. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-50343) Sam Mush discovered that Symfony incorrectly parsed URIs with special characters. An attacker could possibly use this issue to perform phishing attacks. (CVE-2024-50345) Update Instructions: Run `sudo pro fix USN-7272-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-symfony - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-all-my-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-sns-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-sqs-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amqp-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-asset - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-asset-mapper - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-bandwidth-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-beanstalkd-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-brevo-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-brevo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-browser-kit - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-cache - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-chatwork-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-click-send-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-clickatell-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-clock - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-config - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-console - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-contact-everyone-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-crowdin-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-css-selector - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-debug-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dependency-injection - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-discord-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-doctrine-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-doctrine-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dom-crawler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dotenv - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-engagespot-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-error-handler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-esendex-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-event-dispatcher - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-expo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-expression-language - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-fake-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-fake-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-filesystem - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-finder - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-firebase-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-form - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-forty-six-elks-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-framework-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-free-mobile-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-gateway-api-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-gitter-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-go-ip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-google-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-google-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-html-sanitizer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-client - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-foundation - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-kernel - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-infobip-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-infobip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-intl - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-iqsms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-isendpro-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-kaz-info-teh-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ldap - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-light-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-line-notify-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-linked-in-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-lock - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-loco-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-lokalise-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mail-pace-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailchimp-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailer-send-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailgun-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailjet-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailjet-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mastodon-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mattermost-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mercure-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-message-bird-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-message-media-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-microsoft-teams-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mime - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mobyt-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-monolog-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-novu-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ntfy-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-octopush-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-oh-my-smtp-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-one-signal-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-options-resolver - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-orange-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ovh-cloud-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-pager-duty-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-password-hasher - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-phpunit-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-phrase-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-plivo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-postmark-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-process - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-property-access - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-property-info - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-proxy-manager-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-psr-http-message-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-pushover-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-rate-limiter - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-redis-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-redlink-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-remote-event - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ring-central-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-rocket-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-routing - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-runtime - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-scaleway-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-scheduler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-core - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-csrf - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-http - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-semaphore - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendberry-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendgrid-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendinblue-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendinblue-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-serializer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-simple-textin-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sinch-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-slack-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms-biuras-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms-factor-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms77-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsapi-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsc-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsmode-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-spot-hit-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-stopwatch - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-string - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-telegram-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-telnyx-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-templating - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-termii-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-translation - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-turbo-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twig-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twig-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twilio-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twitter-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-uid - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-validator - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-var-dumper - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-var-exporter - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-vonage-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-web-link - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-web-profiler-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-webhook - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-workflow - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-yaml - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-yunpian-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-zendesk-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-zulip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-24894
CVE-2022-24895
CVE-2023-46734
CVE-2024-50340
CVE-2024-50341
CVE-2024-50342
CVE-2024-50343
CVE-2024-50345
CVE-2024-51996
USN-7275-2 -- Libtasn1 vulnerability
Ubuntu 24.04 LTS
USN-7275-1 fixed vulnerabilities in Libtasn1. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Bing Shi discovered that Libtasn1 inefficiently handled certificates. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7275-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtasn1-6 - 4.19.0-3ubuntu0.24.04.1 libtasn1-6-dev - 4.19.0-3ubuntu0.24.04.1 libtasn1-bin - 4.19.0-3ubuntu0.24.04.1 libtasn1-doc - 4.19.0-3ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-12133
USN-7278-1 -- OpenSSL vulnerabilities
Ubuntu 24.04 LTS
George Pantelakis and Alicja Kario discovered that OpenSSL had a timing side-channel when performing ECDSA signature computations. A remote attacker could possibly use this issue to recover private data. (CVE-2024-13176) It was discovered that OpenSSL incorrectly handled certain memory operations when using low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial. When being used in this uncommon fashion, a remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-9143) Update Instructions: Run `sudo pro fix USN-7278-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.5 libssl-doc - 3.0.13-0ubuntu3.5 libssl3t64 - 3.0.13-0ubuntu3.5 openssl - 3.0.13-0ubuntu3.5 No subscription required
Low
CVE-2024-13176
CVE-2024-9143
USN-7279-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7279-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.6-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.6-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.6-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.6-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.6-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-24143
CVE-2025-24150
CVE-2025-24158
CVE-2025-24162
USN-7280-1 -- Python vulnerability
Ubuntu 24.04 LTS
It was discovered that Python incorrectly handled parsing domain names that included square brackets. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack. Update Instructions: Run `sudo pro fix USN-7280-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.5 libpython3.12-dev - 3.12.3-1ubuntu0.5 libpython3.12-minimal - 3.12.3-1ubuntu0.5 libpython3.12-stdlib - 3.12.3-1ubuntu0.5 libpython3.12-testsuite - 3.12.3-1ubuntu0.5 libpython3.12t64 - 3.12.3-1ubuntu0.5 python3.12 - 3.12.3-1ubuntu0.5 python3.12-dev - 3.12.3-1ubuntu0.5 python3.12-doc - 3.12.3-1ubuntu0.5 python3.12-examples - 3.12.3-1ubuntu0.5 python3.12-full - 3.12.3-1ubuntu0.5 python3.12-minimal - 3.12.3-1ubuntu0.5 python3.12-nopie - 3.12.3-1ubuntu0.5 python3.12-venv - 3.12.3-1ubuntu0.5 No subscription required
Medium
CVE-2025-0938
USN-7281-1 -- GnuTLS vulnerability
Ubuntu 24.04 LTS
Bing Shi discovered that GnuTLS incorrectly handled decoding certain DER-encoded certificates. A remote attacker could possibly use this issue to cause GnuTLS to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7281-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.3-1.1ubuntu3.3 gnutls-doc - 3.8.3-1.1ubuntu3.3 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.3 libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.3 libgnutls28-dev - 3.8.3-1.1ubuntu3.3 libgnutls30t64 - 3.8.3-1.1ubuntu3.3 No subscription required
Medium
CVE-2024-12243
USN-7284-1 -- Netty vulnerabilities
Ubuntu 24.04 LTS
Jonathan Leitschuh discovered that Netty did not correctly handle file permissions when writing temporary files. An attacker could possibly use this issue to leak sensitive information. (CVE-2022-24823) It was discovered that Netty did not correctly handle limiting the number of fields when decoding a HTTP request. An attacker could possibly use issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29025) Update Instructions: Run `sudo pro fix USN-7284-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnetty-java - 1:4.1.48-9ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-24823
CVE-2024-29025
USN-7285-2 -- nginx vulnerability
Ubuntu 24.04 LTS
USN-7285-1 fixed vulnerabilities in nginx. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nginx incorrectly handled when multiple server blocks are configured to share the same IP address and port. An attacker could use this issue to use session resumption to bypass client certificate authentication requirements on these servers. Update Instructions: Run `sudo pro fix USN-7285-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.3 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.3 libnginx-mod-http-perl - 1.24.0-2ubuntu7.3 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.3 libnginx-mod-mail - 1.24.0-2ubuntu7.3 libnginx-mod-stream - 1.24.0-2ubuntu7.3 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.3 nginx - 1.24.0-2ubuntu7.3 nginx-common - 1.24.0-2ubuntu7.3 nginx-core - 1.24.0-2ubuntu7.3 nginx-dev - 1.24.0-2ubuntu7.3 nginx-doc - 1.24.0-2ubuntu7.3 nginx-extras - 1.24.0-2ubuntu7.3 nginx-full - 1.24.0-2ubuntu7.3 nginx-light - 1.24.0-2ubuntu7.3 No subscription required
Medium
CVE-2025-23419
USN-7286-1 -- iniParser vulnerability
Ubuntu 24.04 LTS
It was discovered that iniParser incorrectly handled certain files. An attacker could possibly use this issue to cause iniParser to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7286-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiniparser-dev - 4.1-7ubuntu0.1 libiniparser-doc - 4.1-7ubuntu0.1 libiniparser1 - 4.1-7ubuntu0.1 No subscription required
Medium
CVE-2025-0633
USN-7287-1 -- libcap2 vulnerability
Ubuntu 24.04 LTS
Tianjia Zhang discovered the libcap2 PAM module pam_cap incorrectly handled parsing group names in the configuration file. This could result in certain users being granted capabilities, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7287-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcap-dev - 1:2.66-5ubuntu2.2 libcap2 - 1:2.66-5ubuntu2.2 libcap2-bin - 1:2.66-5ubuntu2.2 libpam-cap - 1:2.66-5ubuntu2.2 No subscription required
Medium
CVE-2025-1390
USN-7297-1 -- ProFTPD vulnerabilities
Ubuntu 24.04 LTS
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that the transport protocol implementation in ProFTPD had weak integrity checks. An attacker could use this vulnerability to bypass security features like encryption and integrity checks. (CVE-2023-48795) Martin Mirchev discovered that ProFTPD did not properly validate user input over the network. An attacker could use this vulnerability to crash ProFTPD or execute arbitrary code. (CVE-2023-51713) Brian Ristuccia discovered that ProFTPD incorrectly inherited groups from the parent process. An attacker could use this vulnerability to elevate privileges. (CVE-2024-48651) Update Instructions: Run `sudo pro fix USN-7297-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: proftpd-core - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-dev - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-doc - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-crypto - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-geoip - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-ldap - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-mysql - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-odbc - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-pgsql - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-snmp - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-sqlite - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-wrap - 1.3.8.b+dfsg-1ubuntu0.1 No subscription required
Medium
CVE-2023-48795
CVE-2023-51713
CVE-2024-48651
USN-7299-1 -- X.Org X Server vulnerabilities
Ubuntu 24.04 LTS
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain memory operations. An attacker could use these issues to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7299-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.12-1ubuntu1.2 xorg-server-source - 2:21.1.12-1ubuntu1.2 xserver-common - 2:21.1.12-1ubuntu1.2 xserver-xephyr - 2:21.1.12-1ubuntu1.2 xserver-xorg-core - 2:21.1.12-1ubuntu1.2 xserver-xorg-dev - 2:21.1.12-1ubuntu1.2 xserver-xorg-legacy - 2:21.1.12-1ubuntu1.2 xvfb - 2:21.1.12-1ubuntu1.2 No subscription required xwayland - 2:23.2.6-1ubuntu0.4 No subscription required
Medium
CVE-2025-26594
CVE-2025-26595
CVE-2025-26596
CVE-2025-26597
CVE-2025-26598
CVE-2025-26599
CVE-2025-26600
CVE-2025-26601
USN-7301-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47748, CVE-2024-49935, CVE-2024-49892, CVE-2024-49960, CVE-2024-49886, CVE-2024-47757, CVE-2024-47741, CVE-2024-49879, CVE-2024-49983, CVE-2024-47687, CVE-2024-49948, CVE-2024-49902, CVE-2024-49969, CVE-2024-49903, CVE-2024-47675, CVE-2024-47713, CVE-2024-47750, CVE-2024-49951, CVE-2024-49936, CVE-2024-49913, CVE-2024-47684, CVE-2024-49917, CVE-2024-47693, CVE-2024-49871, CVE-2024-47740, CVE-2024-49927, CVE-2024-47698, CVE-2024-49996, CVE-2024-47682, CVE-2024-49889, CVE-2024-49888, CVE-2024-47737, CVE-2024-49881, CVE-2023-52917, CVE-2024-47695, CVE-2024-50015, CVE-2024-49965, CVE-2024-50179, CVE-2024-47677, CVE-2024-50013, CVE-2024-49855, CVE-2024-47751, CVE-2024-49895, CVE-2024-49930, CVE-2024-49905, CVE-2024-47709, CVE-2024-49953, CVE-2024-49896, CVE-2024-47688, CVE-2024-47712, CVE-2024-49907, CVE-2024-49955, CVE-2024-49933, CVE-2024-49880, CVE-2024-49860, CVE-2024-50176, CVE-2024-47727, CVE-2024-47673, CVE-2024-49878, CVE-2024-49862, CVE-2024-49911, CVE-2024-47734, CVE-2024-49995, CVE-2024-49924, CVE-2024-49925, CVE-2024-47749, CVE-2024-49945, CVE-2024-49950, CVE-2024-49891, CVE-2024-49915, CVE-2024-50006, CVE-2024-49962, CVE-2024-49952, CVE-2024-49982, CVE-2024-49939, CVE-2024-49985, CVE-2024-49928, CVE-2024-47692, CVE-2024-49884, CVE-2024-47756, CVE-2024-49918, CVE-2024-49976, CVE-2024-47671, CVE-2024-49859, CVE-2024-47705, CVE-2024-49864, CVE-2024-47733, CVE-2024-49961, CVE-2024-49973, CVE-2024-49989, CVE-2024-47719, CVE-2024-47685, CVE-2024-49988, CVE-2024-49975, CVE-2024-47681, CVE-2024-49944, CVE-2024-47718, CVE-2024-47689, CVE-2024-50008, CVE-2024-49959, CVE-2024-49868, CVE-2024-47743, CVE-2024-49885, CVE-2024-47742, CVE-2024-49946, CVE-2024-49876, CVE-2024-49875, CVE-2024-49894, CVE-2024-49957, CVE-2024-49980, CVE-2024-49851, CVE-2024-47732, CVE-2024-47716, CVE-2024-49938, CVE-2024-50016, CVE-2024-47735, CVE-2024-47696, CVE-2024-47691, CVE-2024-49994, CVE-2024-49863, CVE-2024-50000, CVE-2024-49919, CVE-2024-49947, CVE-2024-50001, CVE-2024-47678, CVE-2024-49870, CVE-2024-53144, CVE-2024-49929, CVE-2024-47730, CVE-2024-47700, CVE-2024-49900, CVE-2024-47723, CVE-2024-49934, CVE-2024-49883, CVE-2024-49897, CVE-2024-49912, CVE-2024-49991, CVE-2024-47701, CVE-2024-49987, CVE-2024-47753, CVE-2024-49923, CVE-2024-47707, CVE-2024-49853, CVE-2024-47720, CVE-2024-49999, CVE-2024-49958, CVE-2024-49861, CVE-2024-49937, CVE-2024-49852, CVE-2024-47703, CVE-2024-47710, CVE-2024-49942, CVE-2024-49963, CVE-2024-47697, CVE-2024-50175, CVE-2024-47745, CVE-2024-49909, CVE-2024-49997, CVE-2024-49874, CVE-2024-47706, CVE-2024-49922, CVE-2024-47739, CVE-2024-49974, CVE-2024-47744, CVE-2024-47754, CVE-2024-49931, CVE-2024-47690, CVE-2024-49986, CVE-2024-47715, CVE-2024-50014, CVE-2024-49898, CVE-2024-47731, CVE-2024-47670, CVE-2024-49877, CVE-2024-50007, CVE-2024-47699, CVE-2024-49998, CVE-2024-41016, CVE-2024-49850, CVE-2024-47752, CVE-2024-49901, CVE-2024-47728, CVE-2024-49856, CVE-2024-49992, CVE-2024-49926, CVE-2024-49978, CVE-2024-47672, CVE-2024-49954, CVE-2024-47704, CVE-2024-47747, CVE-2024-47738, CVE-2024-49966, CVE-2024-47714, CVE-2024-47686, CVE-2024-47702, CVE-2024-49882, CVE-2024-49858, CVE-2024-50002, CVE-2024-49866, CVE-2024-49981, CVE-2024-50012, CVE-2024-50017, CVE-2024-49890, CVE-2024-49977, CVE-2024-49949, CVE-2024-50005, CVE-2024-47679, CVE-2024-49867) Update Instructions: Run `sudo pro fix USN-7301-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-bpf-dev - 6.8.0-54.56 linux-buildinfo-6.8.0-54-generic - 6.8.0-54.56 linux-buildinfo-6.8.0-54-generic-64k - 6.8.0-54.56 linux-cloud-tools-6.8.0-54 - 6.8.0-54.56 linux-cloud-tools-6.8.0-54-generic - 6.8.0-54.56 linux-cloud-tools-common - 6.8.0-54.56 linux-cloud-tools-generic - 6.8.0-54.56 linux-cloud-tools-virtual - 6.8.0-54.56 linux-crashdump - 6.8.0-54.56 linux-doc - 6.8.0-54.56 linux-generic - 6.8.0-54.56 linux-generic-64k - 6.8.0-54.56 linux-generic-lpae - 6.8.0-54.56 linux-headers-6.8.0-54 - 6.8.0-54.56 linux-headers-6.8.0-54-generic - 6.8.0-54.56 linux-headers-6.8.0-54-generic-64k - 6.8.0-54.56 linux-headers-generic - 6.8.0-54.56 linux-headers-generic-64k - 6.8.0-54.56 linux-headers-generic-lpae - 6.8.0-54.56 linux-headers-kvm - 6.8.0-54.56 linux-headers-laptop-23.10 - 6.8.0-54.56 linux-headers-oem-20.04 - 6.8.0-54.56 linux-headers-oem-20.04b - 6.8.0-54.56 linux-headers-oem-20.04c - 6.8.0-54.56 linux-headers-oem-20.04d - 6.8.0-54.56 linux-headers-oem-22.04 - 6.8.0-54.56 linux-headers-virtual - 6.8.0-54.56 linux-image-6.8.0-54-generic - 6.8.0-54.56 linux-image-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-extra-virtual - 6.8.0-54.56 linux-image-generic - 6.8.0-54.56 linux-image-generic-64k - 6.8.0-54.56 linux-image-generic-lpae - 6.8.0-54.56 linux-image-kvm - 6.8.0-54.56 linux-image-laptop-23.10 - 6.8.0-54.56 linux-image-oem-20.04 - 6.8.0-54.56 linux-image-oem-20.04b - 6.8.0-54.56 linux-image-oem-20.04c - 6.8.0-54.56 linux-image-oem-20.04d - 6.8.0-54.56 linux-image-oem-22.04 - 6.8.0-54.56 linux-image-uc-6.8.0-54-generic - 6.8.0-54.56 linux-image-uc-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-uc-generic - 6.8.0-54.56 linux-image-unsigned-6.8.0-54-generic - 6.8.0-54.56 linux-image-unsigned-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-virtual - 6.8.0-54.56 linux-kvm - 6.8.0-54.56 linux-laptop-23.10 - 6.8.0-54.56 linux-lib-rust-6.8.0-54-generic - 6.8.0-54.56 linux-libc-dev - 6.8.0-54.56 linux-modules-6.8.0-54-generic - 6.8.0-54.56 linux-modules-6.8.0-54-generic-64k - 6.8.0-54.56 linux-modules-extra-6.8.0-54-generic - 6.8.0-54.56 linux-modules-ipu6-6.8.0-54-generic - 6.8.0-54.56 linux-modules-ipu6-generic - 6.8.0-54.56 linux-modules-iwlwifi-6.8.0-54-generic - 6.8.0-54.56 linux-modules-iwlwifi-generic - 6.8.0-54.56 linux-modules-iwlwifi-oem-20.04 - 6.8.0-54.56 linux-modules-iwlwifi-oem-20.04d - 6.8.0-54.56 linux-modules-iwlwifi-oem-22.04 - 6.8.0-54.56 linux-modules-usbio-6.8.0-54-generic - 6.8.0-54.56 linux-modules-usbio-generic - 6.8.0-54.56 linux-oem-20.04 - 6.8.0-54.56 linux-oem-20.04b - 6.8.0-54.56 linux-oem-20.04c - 6.8.0-54.56 linux-oem-20.04d - 6.8.0-54.56 linux-oem-22.04 - 6.8.0-54.56 linux-source - 6.8.0-54.56 linux-source-6.8.0 - 6.8.0-54.56 linux-tools-6.8.0-54 - 6.8.0-54.56 linux-tools-6.8.0-54-generic - 6.8.0-54.56 linux-tools-6.8.0-54-generic-64k - 6.8.0-54.56 linux-tools-common - 6.8.0-54.56 linux-tools-generic - 6.8.0-54.56 linux-tools-generic-64k - 6.8.0-54.56 linux-tools-generic-lpae - 6.8.0-54.56 linux-tools-host - 6.8.0-54.56 linux-tools-kvm - 6.8.0-54.56 linux-tools-laptop-23.10 - 6.8.0-54.56 linux-tools-oem-20.04 - 6.8.0-54.56 linux-tools-oem-20.04b - 6.8.0-54.56 linux-tools-oem-20.04c - 6.8.0-54.56 linux-tools-oem-20.04d - 6.8.0-54.56 linux-tools-oem-22.04 - 6.8.0-54.56 linux-tools-virtual - 6.8.0-54.56 linux-virtual - 6.8.0-54.56 No subscription required linux-buildinfo-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-buildinfo-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-cloud-tools-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-cloud-tools-lowlatency - 6.8.0-54.56.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-headers-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-headers-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-headers-lowlatency - 6.8.0-54.56.1 linux-headers-lowlatency-64k - 6.8.0-54.56.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-image-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-image-lowlatency - 6.8.0-54.56.1 linux-image-lowlatency-64k - 6.8.0-54.56.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-unsigned-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-image-unsigned-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-lowlatency - 6.8.0-54.56.1 linux-lowlatency-64k - 6.8.0-54.56.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-lowlatency-cloud-tools-6.8.0-54 - 6.8.0-54.56.1 linux-lowlatency-headers-6.8.0-54 - 6.8.0-54.56.1 linux-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-lowlatency-lib-rust-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-lowlatency-tools-6.8.0-54 - 6.8.0-54.56.1 linux-modules-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-modules-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-modules-iwlwifi-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-modules-iwlwifi-lowlatency - 6.8.0-54.56.1 linux-tools-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-tools-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-tools-lowlatency - 6.8.0-54.56.1 linux-tools-lowlatency-64k - 6.8.0-54.56.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-53144
CVE-2025-0927
USN-7302-1 -- libxml2 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could use this issue to cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2022-49043) It was discovered that the libxml2 xmllint tool incorrectly handled certain memory operations. If a user or automated system were tricked into running xmllint on a specially crafted xml file, a remote attacker could cause xmllint to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2024-34459) It was discovered that libxml2 did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-56171) It was discovered that libxml2 could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-24928) It was discovered that libxml2 could be made to dereference invalid memory. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-27113) Update Instructions: Run `sudo pro fix USN-7302-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.2 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.2 No subscription required
Medium
CVE-2022-49043
CVE-2024-34459
CVE-2024-56171
CVE-2025-24928
CVE-2025-27113
USN-7303-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-49852, CVE-2024-50175, CVE-2024-47709, CVE-2024-47671, CVE-2024-50179, CVE-2024-47743, CVE-2024-47687, CVE-2024-49934, CVE-2024-47700, CVE-2024-49892, CVE-2024-49866, CVE-2024-50012, CVE-2024-49860, CVE-2024-49948, CVE-2024-49882, CVE-2024-47744, CVE-2024-49905, CVE-2024-47728, CVE-2024-49874, CVE-2024-47678, CVE-2024-47688, CVE-2024-47737, CVE-2024-49859, CVE-2024-49947, CVE-2024-49994, CVE-2024-49986, CVE-2024-49917, CVE-2024-50000, CVE-2024-49962, CVE-2024-47733, CVE-2024-47741, CVE-2024-47685, CVE-2024-47752, CVE-2024-49960, CVE-2024-47754, CVE-2024-47675, CVE-2024-49958, CVE-2024-47748, CVE-2024-47679, CVE-2024-47690, CVE-2024-47740, CVE-2024-47672, CVE-2024-49883, CVE-2024-49928, CVE-2024-49961, CVE-2024-47677, CVE-2024-47706, CVE-2024-49955, CVE-2024-49907, CVE-2024-47745, CVE-2024-49963, CVE-2024-47723, CVE-2024-49897, CVE-2024-49927, CVE-2024-50008, CVE-2024-47713, CVE-2024-49894, CVE-2024-49903, CVE-2024-47747, CVE-2024-47705, CVE-2024-49976, CVE-2024-53144, CVE-2024-49983, CVE-2024-49937, CVE-2024-49953, CVE-2024-41016, CVE-2024-49969, CVE-2024-49982, CVE-2024-50007, CVE-2024-50015, CVE-2024-49889, CVE-2024-49923, CVE-2024-49850, CVE-2024-47720, CVE-2024-49973, CVE-2024-49991, CVE-2024-49901, CVE-2024-49881, CVE-2024-49911, CVE-2024-47710, CVE-2024-49981, CVE-2024-49918, CVE-2024-49861, CVE-2024-49959, CVE-2024-50005, CVE-2024-47701, CVE-2024-49855, CVE-2024-49987, CVE-2024-47704, CVE-2024-49977, CVE-2024-47670, CVE-2024-47707, CVE-2024-47735, CVE-2024-49996, CVE-2024-49868, CVE-2024-47749, CVE-2024-49985, CVE-2024-47753, CVE-2024-49877, CVE-2024-47716, CVE-2024-47731, CVE-2024-49880, CVE-2024-47715, CVE-2024-49931, CVE-2024-49856, CVE-2024-49929, CVE-2024-47689, CVE-2024-49885, CVE-2024-50002, CVE-2024-49999, CVE-2024-47734, CVE-2024-49909, CVE-2024-49871, CVE-2024-49915, CVE-2024-50013, CVE-2024-47682, CVE-2024-49864, CVE-2024-49949, CVE-2024-49933, CVE-2024-49975, CVE-2024-49863, CVE-2024-49867, CVE-2024-49951, CVE-2024-50014, CVE-2024-47739, CVE-2024-49886, CVE-2024-49891, CVE-2024-49879, CVE-2024-47696, CVE-2024-49896, CVE-2024-49988, CVE-2024-47691, CVE-2024-47732, CVE-2024-47742, CVE-2024-47698, CVE-2024-49925, CVE-2024-47695, CVE-2024-49898, CVE-2024-49989, CVE-2024-49913, CVE-2024-49935, CVE-2024-50017, CVE-2024-47703, CVE-2024-49954, CVE-2024-49875, CVE-2024-49858, CVE-2024-49997, CVE-2024-49895, CVE-2024-47719, CVE-2024-47750, CVE-2024-47693, CVE-2024-49926, CVE-2024-50001, CVE-2024-47718, CVE-2024-47714, CVE-2024-49919, CVE-2024-49938, CVE-2024-49952, CVE-2024-49942, CVE-2024-49957, CVE-2024-49930, CVE-2024-47702, CVE-2024-50006, CVE-2024-49888, CVE-2024-47756, CVE-2024-49890, CVE-2024-50176, CVE-2024-47686, CVE-2024-49978, CVE-2024-47697, CVE-2024-49974, CVE-2024-47751, CVE-2024-47712, CVE-2024-47727, CVE-2023-52917, CVE-2024-49980, CVE-2024-49965, CVE-2024-49878, CVE-2024-50016, CVE-2024-47738, CVE-2024-47681, CVE-2024-47699, CVE-2024-49998, CVE-2024-49902, CVE-2024-49966, CVE-2024-49884, CVE-2024-49936, CVE-2024-47757, CVE-2024-49851, CVE-2024-49924, CVE-2024-49944, CVE-2024-49912, CVE-2024-49992, CVE-2024-47684, CVE-2024-49950, CVE-2024-49939, CVE-2024-47730, CVE-2024-49853, CVE-2024-49862, CVE-2024-49900, CVE-2024-49876, CVE-2024-49945, CVE-2024-47673, CVE-2024-49870, CVE-2024-47692, CVE-2024-49946, CVE-2024-49995, CVE-2024-49922) Update Instructions: Run `sudo pro fix USN-7303-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-buildinfo-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-cloud-tools-nvidia - 6.8.0-1022.25 linux-headers-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-headers-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-headers-nvidia - 6.8.0-1022.25 linux-headers-nvidia-64k - 6.8.0-1022.25 linux-image-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-image-nvidia - 6.8.0-1022.25 linux-image-nvidia-64k - 6.8.0-1022.25 linux-image-uc-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-uc-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-image-unsigned-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-unsigned-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-extra-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-nvidia-fs-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1022.25 linux-nvidia - 6.8.0-1022.25 linux-nvidia-64k - 6.8.0-1022.25 linux-nvidia-headers-6.8.0-1022 - 6.8.0-1022.25 linux-nvidia-tools-6.8.0-1022 - 6.8.0-1022.25 linux-tools-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-tools-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-tools-nvidia - 6.8.0-1022.25 linux-tools-nvidia-64k - 6.8.0-1022.25 No subscription required linux-buildinfo-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-headers-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-uc-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-uc-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-unsigned-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-extra-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-nvidia-lowlatency - 6.8.0-1022.25.2 linux-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-nvidia-lowlatency-headers-6.8.0-1022 - 6.8.0-1022.25.2 linux-nvidia-lowlatency-tools-6.8.0-1022 - 6.8.0-1022.25.2 linux-tools-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-tools-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-tools-nvidia-lowlatency - 6.8.0-1022.25.2 linux-tools-nvidia-lowlatency-64k - 6.8.0-1022.25.2 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-53144
USN-7303-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47718, CVE-2024-49942, CVE-2024-49897, CVE-2024-49871, CVE-2024-47687, CVE-2024-47692, CVE-2024-47740, CVE-2024-47691, CVE-2024-49973, CVE-2024-49958, CVE-2024-49889, CVE-2024-49927, CVE-2024-49883, CVE-2024-49885, CVE-2024-49912, CVE-2024-47686, CVE-2024-49985, CVE-2024-47732, CVE-2024-47685, CVE-2024-49935, CVE-2024-49995, CVE-2024-47731, CVE-2024-49931, CVE-2024-49886, CVE-2024-53144, CVE-2024-49917, CVE-2024-49868, CVE-2024-49999, CVE-2024-47684, CVE-2024-50013, CVE-2024-49962, CVE-2024-49981, CVE-2024-49858, CVE-2024-49878, CVE-2024-49852, CVE-2024-49928, CVE-2024-50006, CVE-2024-49988, CVE-2024-47697, CVE-2024-49923, CVE-2024-47704, CVE-2024-49947, CVE-2024-47751, CVE-2024-47672, CVE-2024-47737, CVE-2024-49909, CVE-2024-49992, CVE-2024-49944, CVE-2024-49950, CVE-2024-49850, CVE-2024-49951, CVE-2024-49996, CVE-2024-49934, CVE-2024-47705, CVE-2024-47741, CVE-2024-49957, CVE-2024-47682, CVE-2024-49976, CVE-2024-49895, CVE-2024-47689, CVE-2024-49937, CVE-2024-47702, CVE-2024-49959, CVE-2024-47719, CVE-2024-49922, CVE-2024-47743, CVE-2024-47696, CVE-2024-50017, CVE-2024-49864, CVE-2024-47747, CVE-2024-47748, CVE-2024-47701, CVE-2024-49915, CVE-2024-49877, CVE-2024-41016, CVE-2024-49961, CVE-2024-47730, CVE-2024-49924, CVE-2024-49974, CVE-2024-49875, CVE-2024-49918, CVE-2024-47712, CVE-2024-50014, CVE-2024-47679, CVE-2024-49894, CVE-2024-49911, CVE-2024-49855, CVE-2024-49948, CVE-2024-49955, CVE-2023-52917, CVE-2024-50015, CVE-2024-47754, CVE-2024-49929, CVE-2024-50005, CVE-2024-47742, CVE-2024-49991, CVE-2024-49913, CVE-2024-49980, CVE-2024-47749, CVE-2024-49975, CVE-2024-47671, CVE-2024-47677, CVE-2024-47727, CVE-2024-47716, CVE-2024-47707, CVE-2024-49870, CVE-2024-47703, CVE-2024-47710, CVE-2024-49977, CVE-2024-49997, CVE-2024-49853, CVE-2024-47681, CVE-2024-49986, CVE-2024-49969, CVE-2024-50000, CVE-2024-47690, CVE-2024-47709, CVE-2024-47713, CVE-2024-47720, CVE-2024-49879, CVE-2024-47699, CVE-2024-47714, CVE-2024-50012, CVE-2024-49880, CVE-2024-49946, CVE-2024-47735, CVE-2024-49876, CVE-2024-49963, CVE-2024-50176, CVE-2024-49952, CVE-2024-49881, CVE-2024-49987, CVE-2024-49919, CVE-2024-49860, CVE-2024-47744, CVE-2024-47723, CVE-2024-50001, CVE-2024-47756, CVE-2024-49867, CVE-2024-47728, CVE-2024-49933, CVE-2024-47752, CVE-2024-49998, CVE-2024-50179, CVE-2024-47706, CVE-2024-49989, CVE-2024-47670, CVE-2024-49965, CVE-2024-47673, CVE-2024-47700, CVE-2024-47688, CVE-2024-49953, CVE-2024-50016, CVE-2024-49907, CVE-2024-49930, CVE-2024-50002, CVE-2024-49859, CVE-2024-49939, CVE-2024-47675, CVE-2024-49861, CVE-2024-50175, CVE-2024-47757, CVE-2024-49900, CVE-2024-49954, CVE-2024-49982, CVE-2024-49891, CVE-2024-47678, CVE-2024-49936, CVE-2024-49901, CVE-2024-49898, CVE-2024-47693, CVE-2024-50007, CVE-2024-49896, CVE-2024-49863, CVE-2024-47750, CVE-2024-49949, CVE-2024-49888, CVE-2024-47739, CVE-2024-49983, CVE-2024-47695, CVE-2024-47738, CVE-2024-47734, CVE-2024-49892, CVE-2024-47698, CVE-2024-49902, CVE-2024-47715, CVE-2024-49926, CVE-2024-49882, CVE-2024-49978, CVE-2024-49945, CVE-2024-49925, CVE-2024-47733, CVE-2024-49874, CVE-2024-49856, CVE-2024-49966, CVE-2024-49960, CVE-2024-49905, CVE-2024-49866, CVE-2024-49903, CVE-2024-49862, CVE-2024-50008, CVE-2024-49994, CVE-2024-49851, CVE-2024-47745, CVE-2024-49884, CVE-2024-47753, CVE-2024-49938, CVE-2024-49890) Update Instructions: Run `sudo pro fix USN-7303-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-oracle - 6.8.0-1020.21 linux-buildinfo-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-headers-6.8.0-1020-oracle - 6.8.0-1020.21 linux-headers-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-headers-oracle - 6.8.0-1020.21 linux-headers-oracle-64k - 6.8.0-1020.21 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-headers-oracle-lts-24.04 - 6.8.0-1020.21 linux-image-6.8.0-1020-oracle - 6.8.0-1020.21 linux-image-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-image-oracle - 6.8.0-1020.21 linux-image-oracle-64k - 6.8.0-1020.21 linux-image-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-image-oracle-lts-24.04 - 6.8.0-1020.21 linux-image-unsigned-6.8.0-1020-oracle - 6.8.0-1020.21 linux-image-unsigned-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-modules-6.8.0-1020-oracle - 6.8.0-1020.21 linux-modules-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-modules-extra-6.8.0-1020-oracle - 6.8.0-1020.21 linux-modules-extra-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-oracle - 6.8.0-1020.21 linux-oracle-64k - 6.8.0-1020.21 linux-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-oracle-headers-6.8.0-1020 - 6.8.0-1020.21 linux-oracle-lts-24.04 - 6.8.0-1020.21 linux-oracle-tools-6.8.0-1020 - 6.8.0-1020.21 linux-tools-6.8.0-1020-oracle - 6.8.0-1020.21 linux-tools-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-tools-oracle - 6.8.0-1020.21 linux-tools-oracle-64k - 6.8.0-1020.21 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-tools-oracle-lts-24.04 - 6.8.0-1020.21 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-53144
USN-7303-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47709, CVE-2024-49889, CVE-2024-49931, CVE-2024-50008, CVE-2024-49969, CVE-2024-49975, CVE-2024-49958, CVE-2024-47756, CVE-2024-49944, CVE-2024-47707, CVE-2024-47693, CVE-2024-47686, CVE-2024-47734, CVE-2024-47750, CVE-2024-50179, CVE-2024-49942, CVE-2024-49864, CVE-2024-49891, CVE-2024-49965, CVE-2024-49905, CVE-2024-47719, CVE-2024-49877, CVE-2024-47688, CVE-2024-47691, CVE-2024-47710, CVE-2024-47748, CVE-2024-49948, CVE-2024-49998, CVE-2024-47673, CVE-2024-47738, CVE-2024-47701, CVE-2024-47705, CVE-2024-49930, CVE-2024-49985, CVE-2024-50016, CVE-2024-53144, CVE-2023-52917, CVE-2024-47690, CVE-2024-47675, CVE-2024-50176, CVE-2024-49922, CVE-2024-47704, CVE-2024-49982, CVE-2024-47741, CVE-2024-49991, CVE-2024-49902, CVE-2024-49883, CVE-2024-49892, CVE-2024-50002, CVE-2024-49945, CVE-2024-49959, CVE-2024-47732, CVE-2024-49856, CVE-2024-47677, CVE-2024-49978, CVE-2024-49966, CVE-2024-49937, CVE-2024-47744, CVE-2024-49890, CVE-2024-47739, CVE-2024-50012, CVE-2024-47742, CVE-2024-49980, CVE-2024-47706, CVE-2024-49994, CVE-2024-50017, CVE-2024-47697, CVE-2024-49996, CVE-2024-49953, CVE-2024-49871, CVE-2024-47723, CVE-2024-49987, CVE-2024-49917, CVE-2024-49888, CVE-2024-49866, CVE-2024-50005, CVE-2024-47681, CVE-2024-49870, CVE-2024-49898, CVE-2024-49981, CVE-2024-49947, CVE-2024-49918, CVE-2024-49983, CVE-2024-47698, CVE-2024-49850, CVE-2024-50007, CVE-2024-49900, CVE-2024-49923, CVE-2024-49909, CVE-2024-47687, CVE-2024-50015, CVE-2024-47715, CVE-2024-47745, CVE-2024-49926, CVE-2024-49879, CVE-2024-49986, CVE-2024-49929, CVE-2024-49949, CVE-2024-49976, CVE-2024-47749, CVE-2024-47689, CVE-2024-47720, CVE-2024-47743, CVE-2024-49878, CVE-2024-49935, CVE-2024-49955, CVE-2024-49997, CVE-2024-49860, CVE-2024-47703, CVE-2024-50175, CVE-2024-49855, CVE-2024-49861, CVE-2024-49951, CVE-2024-49863, CVE-2024-49882, CVE-2024-50000, CVE-2024-49912, CVE-2024-49974, CVE-2024-49977, CVE-2024-47752, CVE-2024-47700, CVE-2024-49911, CVE-2024-49852, CVE-2024-47740, CVE-2024-47671, CVE-2024-49988, CVE-2024-47699, CVE-2024-47757, CVE-2024-49933, CVE-2024-49913, CVE-2024-49907, CVE-2024-49881, CVE-2024-47751, CVE-2024-47753, CVE-2024-47731, CVE-2024-47730, CVE-2024-49934, CVE-2024-49957, CVE-2024-49938, CVE-2024-47728, CVE-2024-49867, CVE-2024-47754, CVE-2024-49919, CVE-2024-49992, CVE-2024-49950, CVE-2024-49954, CVE-2024-49924, CVE-2024-47670, CVE-2024-50014, CVE-2024-47684, CVE-2024-49884, CVE-2024-47678, CVE-2024-49894, CVE-2024-49859, CVE-2024-47735, CVE-2024-47696, CVE-2024-49999, CVE-2024-49880, CVE-2024-47747, CVE-2024-49885, CVE-2024-49963, CVE-2024-49995, CVE-2024-49897, CVE-2024-49868, CVE-2024-49862, CVE-2024-49928, CVE-2024-47685, CVE-2024-47692, CVE-2024-49927, CVE-2024-47695, CVE-2024-49896, CVE-2024-49875, CVE-2024-49853, CVE-2024-47714, CVE-2024-49989, CVE-2024-49858, CVE-2024-49952, CVE-2024-49973, CVE-2024-49925, CVE-2024-49851, CVE-2024-47712, CVE-2024-49961, CVE-2024-47713, CVE-2024-47718, CVE-2024-49962, CVE-2024-47737, CVE-2024-50001, CVE-2024-49876, CVE-2024-49903, CVE-2024-49939, CVE-2024-49886, CVE-2024-47679, CVE-2024-50006, CVE-2024-49874, CVE-2024-47716, CVE-2024-49895, CVE-2024-47727, CVE-2024-47672, CVE-2024-49901, CVE-2024-47733, CVE-2024-47682, CVE-2024-47702, CVE-2024-50013, CVE-2024-41016, CVE-2024-49960, CVE-2024-49936, CVE-2024-49946, CVE-2024-49915) Update Instructions: Run `sudo pro fix USN-7303-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1019-raspi - 6.8.0-1019.23 linux-headers-6.8.0-1019-raspi - 6.8.0-1019.23 linux-headers-raspi - 6.8.0-1019.23 linux-image-6.8.0-1019-raspi - 6.8.0-1019.23 linux-image-raspi - 6.8.0-1019.23 linux-modules-6.8.0-1019-raspi - 6.8.0-1019.23 linux-raspi - 6.8.0-1019.23 linux-raspi-headers-6.8.0-1019 - 6.8.0-1019.23 linux-raspi-tools-6.8.0-1019 - 6.8.0-1019.23 linux-tools-6.8.0-1019-raspi - 6.8.0-1019.23 linux-tools-raspi - 6.8.0-1019.23 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-53144
USN-7304-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47678, CVE-2024-49952, CVE-2024-47682, CVE-2024-47679, CVE-2024-47748, CVE-2024-47728, CVE-2024-49953, CVE-2024-49883, CVE-2024-47742, CVE-2024-50000, CVE-2024-47733, CVE-2024-47752, CVE-2024-49927, CVE-2024-47713, CVE-2024-49853, CVE-2024-49998, CVE-2024-47672, CVE-2024-49900, CVE-2024-49884, CVE-2024-49876, CVE-2024-47673, CVE-2024-49958, CVE-2024-50274, CVE-2024-49980, CVE-2024-47703, CVE-2024-49891, CVE-2024-47716, CVE-2024-49903, CVE-2024-49868, CVE-2024-47699, CVE-2024-50015, CVE-2024-49896, CVE-2024-49867, CVE-2024-50016, CVE-2024-49862, CVE-2024-49947, CVE-2024-47714, CVE-2024-50179, CVE-2024-50006, CVE-2024-49881, CVE-2024-49933, CVE-2024-49882, CVE-2024-47709, CVE-2024-47686, CVE-2024-49859, CVE-2024-49992, CVE-2024-49957, CVE-2024-47691, CVE-2024-49936, CVE-2024-49878, CVE-2024-49879, CVE-2024-49997, CVE-2024-47697, CVE-2024-49963, CVE-2024-49938, CVE-2024-47723, CVE-2024-47700, CVE-2024-49999, CVE-2024-49923, CVE-2024-49991, CVE-2024-50013, CVE-2024-47730, CVE-2024-47718, CVE-2024-47671, CVE-2024-49977, CVE-2024-53144, CVE-2024-49922, CVE-2024-49985, CVE-2024-47712, CVE-2024-49962, CVE-2024-49907, CVE-2024-49886, CVE-2024-49976, CVE-2024-49902, CVE-2024-47732, CVE-2024-49995, CVE-2024-49942, CVE-2024-47706, CVE-2024-47747, CVE-2024-49949, CVE-2024-49911, CVE-2024-49929, CVE-2024-47737, CVE-2024-47720, CVE-2024-47756, CVE-2024-47688, CVE-2024-47753, CVE-2024-49937, CVE-2024-47684, CVE-2024-47690, CVE-2024-49897, CVE-2024-47705, CVE-2024-49852, CVE-2024-49930, CVE-2024-47681, CVE-2024-50175, CVE-2024-49863, CVE-2024-49969, CVE-2024-49894, CVE-2024-49928, CVE-2024-47698, CVE-2024-47710, CVE-2024-49931, CVE-2024-50008, CVE-2024-49939, CVE-2024-49915, CVE-2024-47757, CVE-2024-49912, CVE-2024-47696, CVE-2024-47702, CVE-2024-49877, CVE-2024-49974, CVE-2024-49919, CVE-2024-49888, CVE-2024-49871, CVE-2024-47685, CVE-2024-47734, CVE-2024-49965, CVE-2024-47707, CVE-2024-49987, CVE-2024-47745, CVE-2024-50001, CVE-2024-49960, CVE-2024-50014, CVE-2024-49994, CVE-2024-49875, CVE-2024-49856, CVE-2024-49926, CVE-2024-47701, CVE-2024-47749, CVE-2024-47715, CVE-2024-49981, CVE-2024-49935, CVE-2024-47754, CVE-2024-47692, CVE-2024-49864, CVE-2024-49983, CVE-2024-49950, CVE-2024-49917, CVE-2024-49924, CVE-2024-47743, CVE-2024-47693, CVE-2024-50176, CVE-2024-47670, CVE-2024-47727, CVE-2024-47739, CVE-2024-49978, CVE-2024-49858, CVE-2024-49861, CVE-2024-49946, CVE-2024-50012, CVE-2024-49934, CVE-2024-49986, CVE-2023-52917, CVE-2024-49870, CVE-2024-49892, CVE-2024-47741, CVE-2024-47731, CVE-2024-47675, CVE-2024-49898, CVE-2024-49959, CVE-2024-49988, CVE-2024-49918, CVE-2024-50002, CVE-2024-49954, CVE-2024-49944, CVE-2024-49996, CVE-2024-49982, CVE-2024-49948, CVE-2024-49901, CVE-2024-47735, CVE-2024-49851, CVE-2024-50007, CVE-2024-49895, CVE-2024-47744, CVE-2024-49889, CVE-2024-50017, CVE-2024-49945, CVE-2024-49890, CVE-2024-49850, CVE-2024-47677, CVE-2024-47704, CVE-2024-49874, CVE-2024-49860, CVE-2024-49961, CVE-2024-49975, CVE-2024-41016, CVE-2024-49951, CVE-2024-49909, CVE-2024-49955, CVE-2024-49885, CVE-2024-50005, CVE-2024-47750, CVE-2024-47695, CVE-2024-49913, CVE-2024-49925, CVE-2024-47689, CVE-2024-49866, CVE-2024-49973, CVE-2024-47751, CVE-2024-49880, CVE-2024-49855, CVE-2024-49989, CVE-2024-47740, CVE-2024-47687, CVE-2024-47738, CVE-2024-47719, CVE-2024-49905, CVE-2024-53064, CVE-2024-49966) Update Instructions: Run `sudo pro fix USN-7304-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-cloud-tools-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-cloud-tools-gkeop - 6.8.0-1006.8 linux-cloud-tools-gkeop-6.8 - 6.8.0-1006.8 linux-gkeop - 6.8.0-1006.8 linux-gkeop-6.8 - 6.8.0-1006.8 linux-gkeop-cloud-tools-6.8.0-1006 - 6.8.0-1006.8 linux-gkeop-headers-6.8.0-1006 - 6.8.0-1006.8 linux-gkeop-tools-6.8.0-1006 - 6.8.0-1006.8 linux-headers-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-headers-gkeop - 6.8.0-1006.8 linux-headers-gkeop-6.8 - 6.8.0-1006.8 linux-image-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-image-gkeop - 6.8.0-1006.8 linux-image-gkeop-6.8 - 6.8.0-1006.8 linux-image-unsigned-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-extra-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-extra-gkeop - 6.8.0-1006.8 linux-modules-extra-gkeop-6.8 - 6.8.0-1006.8 linux-tools-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-tools-gkeop - 6.8.0-1006.8 linux-tools-gkeop-6.8 - 6.8.0-1006.8 No subscription required linux-buildinfo-6.8.0-1019-gke - 6.8.0-1019.23 linux-gke - 6.8.0-1019.23 linux-gke-headers-6.8.0-1019 - 6.8.0-1019.23 linux-gke-tools-6.8.0-1019 - 6.8.0-1019.23 linux-headers-6.8.0-1019-gke - 6.8.0-1019.23 linux-headers-gke - 6.8.0-1019.23 linux-image-6.8.0-1019-gke - 6.8.0-1019.23 linux-image-gke - 6.8.0-1019.23 linux-image-unsigned-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-extra-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-iwlwifi-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-iwlwifi-gke - 6.8.0-1019.23 linux-tools-6.8.0-1019-gke - 6.8.0-1019.23 linux-tools-gke - 6.8.0-1019.23 No subscription required linux-buildinfo-6.8.0-1024-gcp - 6.8.0-1024.26 linux-buildinfo-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-gcp - 6.8.0-1024.26 linux-gcp-64k - 6.8.0-1024.26 linux-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-gcp-headers-6.8.0-1024 - 6.8.0-1024.26 linux-gcp-lts-24.04 - 6.8.0-1024.26 linux-gcp-tools-6.8.0-1024 - 6.8.0-1024.26 linux-headers-6.8.0-1024-gcp - 6.8.0-1024.26 linux-headers-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-headers-gcp - 6.8.0-1024.26 linux-headers-gcp-64k - 6.8.0-1024.26 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-headers-gcp-lts-24.04 - 6.8.0-1024.26 linux-image-6.8.0-1024-gcp - 6.8.0-1024.26 linux-image-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-image-gcp - 6.8.0-1024.26 linux-image-gcp-64k - 6.8.0-1024.26 linux-image-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-image-gcp-lts-24.04 - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-gcp - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-6.8.0-1024-gcp - 6.8.0-1024.26 linux-modules-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-gcp - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-extra-gcp - 6.8.0-1024.26 linux-modules-extra-gcp-64k - 6.8.0-1024.26 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1024.26 linux-tools-6.8.0-1024-gcp - 6.8.0-1024.26 linux-tools-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-tools-gcp - 6.8.0-1024.26 linux-tools-gcp-64k - 6.8.0-1024.26 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-tools-gcp-lts-24.04 - 6.8.0-1024.26 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-50274
CVE-2024-53064
CVE-2024-53144
USN-7306-1 -- GNU binutils vulnerabilities
Ubuntu 24.04 LTS
It was discovered that GNU binutils in nm tool is affected by an incorrect access control. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-57360) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-0840) Update Instructions: Run `sudo pro fix USN-7306-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.42-4ubuntu2.4 binutils-aarch64-linux-gnu - 2.42-4ubuntu2.4 binutils-alpha-linux-gnu - 2.42-4ubuntu2.4 binutils-arc-linux-gnu - 2.42-4ubuntu2.4 binutils-arm-linux-gnueabi - 2.42-4ubuntu2.4 binutils-arm-linux-gnueabihf - 2.42-4ubuntu2.4 binutils-common - 2.42-4ubuntu2.4 binutils-dev - 2.42-4ubuntu2.4 binutils-doc - 2.42-4ubuntu2.4 binutils-for-build - 2.42-4ubuntu2.4 binutils-for-host - 2.42-4ubuntu2.4 binutils-hppa-linux-gnu - 2.42-4ubuntu2.4 binutils-hppa64-linux-gnu - 2.42-4ubuntu2.4 binutils-i686-gnu - 2.42-4ubuntu2.4 binutils-i686-kfreebsd-gnu - 2.42-4ubuntu2.4 binutils-i686-linux-gnu - 2.42-4ubuntu2.4 binutils-ia64-linux-gnu - 2.42-4ubuntu2.4 binutils-loongarch64-linux-gnu - 2.42-4ubuntu2.4 binutils-m68k-linux-gnu - 2.42-4ubuntu2.4 binutils-multiarch - 2.42-4ubuntu2.4 binutils-multiarch-dev - 2.42-4ubuntu2.4 binutils-powerpc-linux-gnu - 2.42-4ubuntu2.4 binutils-powerpc64-linux-gnu - 2.42-4ubuntu2.4 binutils-powerpc64le-linux-gnu - 2.42-4ubuntu2.4 binutils-riscv64-linux-gnu - 2.42-4ubuntu2.4 binutils-s390x-linux-gnu - 2.42-4ubuntu2.4 binutils-sh4-linux-gnu - 2.42-4ubuntu2.4 binutils-source - 2.42-4ubuntu2.4 binutils-sparc64-linux-gnu - 2.42-4ubuntu2.4 binutils-x86-64-gnu - 2.42-4ubuntu2.4 binutils-x86-64-kfreebsd-gnu - 2.42-4ubuntu2.4 binutils-x86-64-linux-gnu - 2.42-4ubuntu2.4 binutils-x86-64-linux-gnux32 - 2.42-4ubuntu2.4 libbinutils - 2.42-4ubuntu2.4 libctf-nobfd0 - 2.42-4ubuntu2.4 libctf0 - 2.42-4ubuntu2.4 libgprofng0 - 2.42-4ubuntu2.4 libsframe1 - 2.42-4ubuntu2.4 No subscription required
Medium
CVE-2024-57360
CVE-2025-0840
USN-7307-1 -- xmltok library vulnerability
Ubuntu 24.04 LTS
Tim Boddy discovered that Expat, contained within the xmltok library, did not properly handle memory reallocation when processing XML files. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive memory resources. Update Instructions: Run `sudo pro fix USN-7307-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm3 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm3 Available with Ubuntu Pro: https://ubuntu.com/pro
Low
CVE-2012-1148
USN-7309-1 -- Ruby SAML vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ruby SAML did not properly validate SAML responses. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5697) It was discovered that Ruby SAML incorrectly utilized the results of XML DOM traversal and canonicalization APIs. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-11428) It was discovered that Ruby SAML did not properly verify the signature of the SAML Response, allowing multiple elements with the same ID. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. (CVE-2024-45409) Update Instructions: Run `sudo pro fix USN-7309-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-saml - 1.15.0-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2016-5697
CVE-2017-11428
CVE-2024-45409
USN-7310-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - Buffer Sharing and Synchronization framework; - EDAC drivers; - FireWire subsystem; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Powercap sysfs driver; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - UBI file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Bluetooth subsystem; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Perf events; - Kernel fork() syscall; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Task handling mechanism; - Timer substystem drivers; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - IUCV driver; - L2TP protocol; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; - KVM core; (CVE-2024-50244, CVE-2024-56754, CVE-2024-50082, CVE-2024-47737, CVE-2024-50300, CVE-2024-49872, CVE-2024-50180, CVE-2024-50218, CVE-2024-49956, CVE-2024-53189, CVE-2024-56705, CVE-2024-50119, CVE-2024-53192, CVE-2024-49950, CVE-2024-56722, CVE-2024-49943, CVE-2024-50031, CVE-2024-47685, CVE-2024-50296, CVE-2024-49939, CVE-2024-47696, CVE-2024-47752, CVE-2024-49937, CVE-2024-53140, CVE-2024-50236, CVE-2024-50151, CVE-2024-50069, CVE-2024-50170, CVE-2024-50246, CVE-2024-50217, CVE-2024-53125, CVE-2024-50084, CVE-2024-50005, CVE-2024-53137, CVE-2024-50233, CVE-2024-49991, CVE-2024-50067, CVE-2024-50290, CVE-2024-47735, CVE-2024-53133, CVE-2024-50289, CVE-2024-49855, CVE-2024-49868, CVE-2024-56728, CVE-2024-56726, CVE-2024-50012, CVE-2024-53078, CVE-2024-50223, CVE-2024-50143, CVE-2024-50287, CVE-2024-49971, CVE-2024-49900, CVE-2024-50263, CVE-2024-50206, CVE-2024-47707, CVE-2024-47751, CVE-2024-56747, CVE-2024-50260, CVE-2024-50173, CVE-2024-47680, CVE-2024-50009, CVE-2024-53219, CVE-2024-53144, CVE-2024-50008, CVE-2024-53208, CVE-2024-49966, CVE-2024-50104, CVE-2024-50030, CVE-2024-53049, CVE-2024-53201, CVE-2024-50130, CVE-2024-49856, CVE-2024-53095, CVE-2024-50033, CVE-2024-47730, CVE-2024-53216, CVE-2024-50286, CVE-2024-50284, CVE-2024-47744, CVE-2023-52917, CVE-2024-50275, CVE-2024-53114, CVE-2024-49968, CVE-2024-50111, CVE-2024-50000, CVE-2024-53081, CVE-2024-49857, CVE-2024-50262, CVE-2024-50281, CVE-2024-53156, CVE-2024-50225, CVE-2024-53239, CVE-2024-50036, CVE-2024-50187, CVE-2024-53165, CVE-2024-49931, CVE-2024-53111, CVE-2024-49862, CVE-2024-47701, CVE-2024-53091, CVE-2024-50103, CVE-2024-53046, CVE-2024-56678, CVE-2024-56749, CVE-2024-53175, CVE-2024-49970, CVE-2024-50035, CVE-2024-50088, CVE-2024-50297, CVE-2024-47721, CVE-2024-50240, CVE-2024-50076, CVE-2024-56683, CVE-2024-53120, CVE-2024-50074, CVE-2024-50095, CVE-2024-49963, CVE-2024-50158, CVE-2024-50020, CVE-2024-53083, CVE-2024-50029, CVE-2024-56755, CVE-2024-49969, CVE-2024-50022, CVE-2024-50278, CVE-2024-50125, CVE-2024-47706, CVE-2024-50204, CVE-2024-56543, CVE-2024-53108, CVE-2024-49885, CVE-2024-50128, CVE-2024-50062, CVE-2024-50139, CVE-2024-50183, CVE-2024-50288, CVE-2024-56729, CVE-2024-49945, CVE-2024-47695, CVE-2024-56533, CVE-2024-53234, CVE-2024-50002, CVE-2024-50040, CVE-2024-49903, CVE-2024-47702, CVE-2024-47728, CVE-2024-49874, CVE-2024-47718, CVE-2024-53142, CVE-2024-49983, CVE-2024-50211, CVE-2024-50294, CVE-2024-50132, CVE-2024-53236, CVE-2024-50042, CVE-2024-49999, CVE-2024-50001, CVE-2024-50046, CVE-2024-50133, CVE-2024-50256, CVE-2024-49869, CVE-2024-49852, CVE-2024-47717, CVE-2024-56704, CVE-2024-50102, CVE-2024-50150, CVE-2024-49880, CVE-2024-50235, CVE-2024-49892, CVE-2024-53194, CVE-2024-53104, CVE-2024-50232, CVE-2024-50226, CVE-2024-56684, CVE-2024-47713, CVE-2024-50191, CVE-2024-49850, CVE-2024-50277, CVE-2024-53113, CVE-2024-50013, CVE-2024-53221, CVE-2024-50220, CVE-2024-49960, CVE-2024-53228, CVE-2024-50152, CVE-2024-56689, CVE-2024-53220, CVE-2024-50209, CVE-2024-50285, CVE-2024-50197, CVE-2024-53072, CVE-2024-50273, CVE-2024-49928, CVE-2024-53132, CVE-2024-56720, CVE-2024-50194, CVE-2024-50112, CVE-2024-53079, CVE-2024-56696, CVE-2024-47750, CVE-2024-53212, CVE-2024-56541, CVE-2024-50024, CVE-2024-53168, CVE-2024-50247, CVE-2024-50193, CVE-2024-47754, CVE-2024-56540, CVE-2024-50026, CVE-2024-53047, CVE-2024-53151, CVE-2024-50176, CVE-2024-49975, CVE-2024-50034, CVE-2024-50126, CVE-2024-49863, CVE-2024-47693, CVE-2024-49954, CVE-2024-49938, CVE-2024-50171, CVE-2024-50185, CVE-2024-50200, CVE-2024-50201, CVE-2024-53184, CVE-2024-47709, CVE-2024-50138, CVE-2024-49935, CVE-2024-50049, CVE-2024-56537, CVE-2024-50057, CVE-2024-56677, CVE-2024-47743, CVE-2024-50293, CVE-2024-50099, CVE-2024-47720, CVE-2024-50021, CVE-2024-50059, CVE-2024-49871, CVE-2024-49884, CVE-2024-47694, CVE-2024-56723, CVE-2024-47724, CVE-2024-50038, CVE-2024-53123, CVE-2024-53177, CVE-2024-49932, CVE-2024-50196, CVE-2024-50234, CVE-2024-50078, CVE-2024-53043, CVE-2024-49926, CVE-2024-49988, CVE-2024-53187, CVE-2024-53056, CVE-2024-53217, CVE-2024-56745, CVE-2024-47726, CVE-2024-50063, CVE-2024-49987, CVE-2024-49955, CVE-2024-50179, CVE-2024-49866, CVE-2024-50283, CVE-2024-49997, CVE-2024-47742, CVE-2024-56691, CVE-2024-50253, CVE-2024-56690, CVE-2024-47710, CVE-2024-53129, CVE-2024-50190, CVE-2024-50090, CVE-2024-56702, CVE-2024-50148, CVE-2024-53183, CVE-2024-50070, CVE-2024-50154, CVE-2024-50243, CVE-2024-50003, CVE-2024-50117, CVE-2024-56751, CVE-2024-56697, CVE-2024-53166, CVE-2024-53196, CVE-2024-47677, CVE-2024-56679, CVE-2024-49996, CVE-2024-47681, CVE-2024-53181, CVE-2024-47700, CVE-2024-53071, CVE-2024-50015, CVE-2024-53126, CVE-2024-50165, CVE-2024-50172, CVE-2024-53063, CVE-2024-53200, CVE-2024-53135, CVE-2024-49974, CVE-2024-53088, CVE-2024-49936, CVE-2024-53121, CVE-2024-50166, CVE-2024-50087, CVE-2024-53065, CVE-2024-53214, CVE-2024-53076, CVE-2024-53059, CVE-2024-50230, CVE-2024-49985, CVE-2024-50092, CVE-2024-53233, CVE-2024-50047, CVE-2024-56685, CVE-2024-47682, CVE-2024-47705, CVE-2024-50077, CVE-2024-53224, CVE-2024-49887, CVE-2024-49940, CVE-2024-47741, CVE-2024-49858, CVE-2024-56536, CVE-2024-53055, CVE-2024-56687, CVE-2024-50100, CVE-2024-53075, CVE-2024-47699, CVE-2024-53213, CVE-2024-49977, CVE-2024-50268, CVE-2024-53146, CVE-2024-50304, CVE-2024-50096, CVE-2024-53162, CVE-2024-56725, CVE-2024-49953, CVE-2024-53077, CVE-2024-50107, CVE-2024-53226, CVE-2024-53134, CVE-2024-49873, CVE-2024-56548, CVE-2024-53145, CVE-2024-53141, CVE-2024-56741, CVE-2024-53067, CVE-2024-53152, CVE-2024-50072, CVE-2024-50282, CVE-2024-53232, CVE-2024-50140, CVE-2024-53198, CVE-2024-53150, CVE-2024-49876, CVE-2024-50302, CVE-2024-53115, CVE-2024-47692, CVE-2024-50301, CVE-2024-50202, CVE-2024-50155, CVE-2024-56693, CVE-2024-53082, CVE-2024-53167, CVE-2024-56748, CVE-2024-53064, CVE-2024-50227, CVE-2024-56539, CVE-2024-50215, CVE-2024-50043, CVE-2024-50146, CVE-2024-50147, CVE-2024-56699, CVE-2024-50122, CVE-2024-53044, CVE-2024-47712, CVE-2024-53230, CVE-2024-50121, CVE-2024-50216, CVE-2024-53084, CVE-2024-56703, CVE-2024-50178, CVE-2024-49934, CVE-2024-47678, CVE-2024-50271, CVE-2024-50144, CVE-2024-50252, CVE-2024-47734, CVE-2024-47711, CVE-2024-50214, CVE-2024-53100, CVE-2024-56680, CVE-2024-50198, CVE-2024-50025, CVE-2024-50044, CVE-2024-50098, CVE-2024-47745, CVE-2024-49860, CVE-2024-49881, CVE-2024-53048, CVE-2024-56721, CVE-2024-56756, CVE-2024-53171, CVE-2024-49901, CVE-2024-53109, CVE-2024-53061, CVE-2024-49929, CVE-2024-47691, CVE-2024-50045, CVE-2024-47723, CVE-2024-56546, CVE-2024-50157, CVE-2024-53169, CVE-2024-47716, CVE-2024-53093, CVE-2024-50224, CVE-2024-53193, CVE-2024-49895, CVE-2024-47698, CVE-2024-49942, CVE-2024-50167, CVE-2024-53202, CVE-2024-49870, CVE-2024-50291, CVE-2024-50156, CVE-2024-53153, CVE-2024-50272, CVE-2024-50145, CVE-2024-50298, CVE-2024-50274, CVE-2024-56694, CVE-2024-50108, CVE-2024-50222, CVE-2024-53163, CVE-2024-50164, CVE-2024-53062, CVE-2024-50212, CVE-2024-53127, CVE-2024-47688, CVE-2024-49959, CVE-2024-50203, CVE-2024-49927, CVE-2024-50083, CVE-2024-53227, CVE-2024-47697, CVE-2024-53053, CVE-2024-53172, CVE-2024-56752, CVE-2024-50207, CVE-2024-50169, CVE-2024-53176, CVE-2024-53089, CVE-2024-56707, CVE-2024-53195, CVE-2024-49851, CVE-2024-53209, CVE-2024-49972, CVE-2024-53130, CVE-2024-53157, CVE-2024-53094, CVE-2024-50182, CVE-2024-49879, CVE-2024-53191, CVE-2024-49925, CVE-2024-49949, CVE-2024-56534, CVE-2024-47714, CVE-2024-53161, CVE-2024-49992, CVE-2024-47732, CVE-2024-53143, CVE-2024-53119, CVE-2024-50064, CVE-2024-50039, CVE-2024-53087, CVE-2024-49886, CVE-2024-49979, CVE-2024-50041, CVE-2024-50184, CVE-2024-49958, CVE-2024-50221, CVE-2024-56688, CVE-2024-49941, CVE-2024-50245, CVE-2024-50017, CVE-2024-53180, CVE-2024-56535, CVE-2024-50142, CVE-2024-50295, CVE-2024-56708, CVE-2024-50016, CVE-2024-49902, CVE-2024-50120, CVE-2024-47748, CVE-2024-49982, CVE-2024-50257, CVE-2024-50086, CVE-2024-50261, CVE-2024-53188, CVE-2024-49888, CVE-2024-53106, CVE-2024-50073, CVE-2024-50186, CVE-2024-56544, CVE-2024-47739, CVE-2024-50238, CVE-2024-56739, CVE-2024-49964, CVE-2024-47686, CVE-2024-46869, CVE-2024-53116, CVE-2024-50014, CVE-2024-53231, CVE-2024-53138, CVE-2024-50213, CVE-2024-50265, CVE-2024-49998, CVE-2024-50292, CVE-2024-50137, CVE-2024-50114, CVE-2024-53237, CVE-2024-49952, CVE-2024-53074, CVE-2024-49981, CVE-2024-47733, CVE-2024-50019, CVE-2024-47719, CVE-2024-53068, CVE-2024-49944, CVE-2024-50066, CVE-2024-50007, CVE-2024-53155, CVE-2024-47756, CVE-2024-49947, CVE-2024-49951, CVE-2024-50065, CVE-2024-49957, CVE-2024-50116, CVE-2024-50188, CVE-2024-50255, CVE-2024-53197, CVE-2024-50267, CVE-2024-50124, CVE-2024-53069, CVE-2024-53139, CVE-2024-47676, CVE-2024-56545, CVE-2024-53085, CVE-2024-50163, CVE-2024-53092, CVE-2024-53099, CVE-2024-49889, CVE-2024-53052, CVE-2024-49995, CVE-2024-49976, CVE-2024-50110, CVE-2024-50192, CVE-2024-50208, CVE-2024-50276, CVE-2024-53170, CVE-2024-50259, CVE-2024-47731, CVE-2024-49924, CVE-2024-56532, CVE-2024-50048, CVE-2024-49965, CVE-2024-53147, CVE-2024-50205, CVE-2024-49859, CVE-2024-53066, CVE-2024-47687, CVE-2024-50149, CVE-2024-49864, CVE-2024-49867, CVE-2024-50160, CVE-2024-53058, CVE-2024-47753, CVE-2024-49883, CVE-2024-53199, CVE-2024-56746, CVE-2024-50094, CVE-2024-49946, CVE-2024-50006, CVE-2024-53101, CVE-2024-49891, CVE-2024-50075, CVE-2024-47747, CVE-2024-47740, CVE-2024-50248, CVE-2024-50162, CVE-2024-53090, CVE-2024-53203, CVE-2024-50242, CVE-2024-49961, CVE-2024-50085, CVE-2024-50299, CVE-2024-49980, CVE-2024-50280, CVE-2024-53107, CVE-2024-50199, CVE-2024-53122, CVE-2024-56674, CVE-2024-50079, CVE-2024-50060, CVE-2024-53210, CVE-2024-50177, CVE-2024-53223, CVE-2024-50127, CVE-2024-53190, CVE-2022-49034, CVE-2024-56744, CVE-2024-50136, CVE-2024-47675, CVE-2024-50303, CVE-2024-50123, CVE-2024-47738, CVE-2024-50239, CVE-2024-50135, CVE-2024-53218, CVE-2024-50109, CVE-2024-56724, CVE-2024-56681, CVE-2024-50027, CVE-2024-50081, CVE-2024-50068, CVE-2024-50101, CVE-2024-50071, CVE-2024-50129, CVE-2024-50091, CVE-2024-53112, CVE-2024-50181, CVE-2024-50080, CVE-2024-47703, CVE-2024-47727, CVE-2024-53215, CVE-2024-53105, CVE-2024-50174, CVE-2024-50105, CVE-2024-56700, CVE-2024-53173, CVE-2024-49865, CVE-2024-49973, CVE-2024-56538, CVE-2024-50251, CVE-2024-56692, CVE-2024-47671, CVE-2024-50189, CVE-2024-49853, CVE-2024-50153, CVE-2024-53124, CVE-2024-56549, CVE-2024-53160, CVE-2024-53174, CVE-2024-53117, CVE-2024-50279, CVE-2024-50118, CVE-2024-47757, CVE-2024-50055, CVE-2024-49875, CVE-2024-50141, CVE-2024-49890, CVE-2024-49878, CVE-2024-50134, CVE-2024-53042, CVE-2024-56727, CVE-2024-49861, CVE-2024-49948, CVE-2024-50010, CVE-2024-49930, CVE-2024-49877, CVE-2024-47690, CVE-2024-50115, CVE-2024-50254, CVE-2024-50250, CVE-2024-47679, CVE-2024-50258, CVE-2024-53128, CVE-2024-49994, CVE-2024-53154, CVE-2024-50037, CVE-2024-53149, CVE-2024-50266, CVE-2024-50061, CVE-2024-56698, CVE-2024-53118, CVE-2024-47689, CVE-2024-47708, CVE-2024-50131, CVE-2024-50168, CVE-2024-53158, CVE-2024-49894, CVE-2024-50056, CVE-2024-50231, CVE-2024-50270, CVE-2024-50269, CVE-2024-50237, CVE-2024-56742, CVE-2024-49882, CVE-2024-47749, CVE-2024-49962, CVE-2024-49933, CVE-2024-53045, CVE-2024-50028, CVE-2024-53178, CVE-2024-50229, CVE-2024-50023, CVE-2024-50161, CVE-2024-56701, CVE-2024-49978, CVE-2024-50093, CVE-2024-50195, CVE-2024-49986, CVE-2024-53098, CVE-2024-53131, CVE-2024-47684, CVE-2024-53148, CVE-2024-50058, CVE-2024-53086, CVE-2024-50113, CVE-2024-49989, CVE-2024-50106, CVE-2024-53080, CVE-2024-53229, CVE-2024-50159, CVE-2024-56531, CVE-2024-53110, CVE-2024-47736, CVE-2024-56542, CVE-2024-47746) Update Instructions: Run `sudo pro fix USN-7310-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1015-oem - 6.11.0-1015.15 linux-headers-6.11.0-1015-oem - 6.11.0-1015.15 linux-headers-oem-24.04b - 6.11.0-1015.15 linux-image-6.11.0-1015-oem - 6.11.0-1015.15 linux-image-oem-24.04b - 6.11.0-1015.15 linux-image-uc-6.11.0-1015-oem - 6.11.0-1015.15 linux-image-uc-oem-24.04b - 6.11.0-1015.15 linux-image-unsigned-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu6-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu6-oem-24.04b - 6.11.0-1015.15 linux-modules-ipu7-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu7-oem-24.04b - 6.11.0-1015.15 linux-modules-iwlwifi-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1015.15 linux-modules-usbio-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-usbio-oem-24.04b - 6.11.0-1015.15 linux-modules-vision-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-vision-oem-24.04b - 6.11.0-1015.15 linux-oem-24.04b - 6.11.0-1015.15 linux-oem-6.11-headers-6.11.0-1015 - 6.11.0-1015.15 linux-oem-6.11-tools-6.11.0-1015 - 6.11.0-1015.15 linux-tools-6.11.0-1015-oem - 6.11.0-1015.15 linux-tools-oem-24.04b - 6.11.0-1015.15 No subscription required
High
CVE-2022-49034
CVE-2024-46869
CVE-2024-47671
CVE-2024-47675
CVE-2024-47676
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47680
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47694
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47708
CVE-2024-47709
CVE-2024-47710
CVE-2024-47711
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47716
CVE-2024-47717
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47721
CVE-2024-47723
CVE-2024-47724
CVE-2024-47726
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47736
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47746
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49857
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49865
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49869
CVE-2024-49870
CVE-2024-49871
CVE-2024-49872
CVE-2024-49873
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49887
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49932
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49940
CVE-2024-49941
CVE-2024-49942
CVE-2024-49943
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49956
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49964
CVE-2024-49965
CVE-2024-49966
CVE-2024-49968
CVE-2024-49969
CVE-2024-49970
CVE-2024-49971
CVE-2024-49972
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49979
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50003
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50009
CVE-2024-50010
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50033
CVE-2024-50034
CVE-2024-50035
CVE-2024-50036
CVE-2024-50037
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50043
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50067
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50071
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50079
CVE-2024-50080
CVE-2024-50081
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50091
CVE-2024-50092
CVE-2024-50093
CVE-2024-50094
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50100
CVE-2024-50101
CVE-2024-50102
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50106
CVE-2024-50107
CVE-2024-50108
CVE-2024-50109
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50113
CVE-2024-50114
CVE-2024-50115
CVE-2024-50116
CVE-2024-50117
CVE-2024-50118
CVE-2024-50119
CVE-2024-50120
CVE-2024-50121
CVE-2024-50122
CVE-2024-50123
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50129
CVE-2024-50130
CVE-2024-50131
CVE-2024-50132
CVE-2024-50133
CVE-2024-50134
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50144
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50148
CVE-2024-50149
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50157
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50161
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50165
CVE-2024-50166
CVE-2024-50167
CVE-2024-50168
CVE-2024-50169
CVE-2024-50170
CVE-2024-50171
CVE-2024-50172
CVE-2024-50173
CVE-2024-50174
CVE-2024-50176
CVE-2024-50177
CVE-2024-50178
CVE-2024-50179
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50190
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50203
CVE-2024-50204
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50211
CVE-2024-50212
CVE-2024-50213
CVE-2024-50214
CVE-2024-50215
CVE-2024-50216
CVE-2024-50217
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50227
CVE-2024-50229
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50233
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50253
CVE-2024-50254
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50260
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50266
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50277
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50281
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50293
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50302
CVE-2024-50303
CVE-2024-50304
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53049
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53056
CVE-2024-53058
CVE-2024-53059
CVE-2024-53061
CVE-2024-53062
CVE-2024-53063
CVE-2024-53064
CVE-2024-53065
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53069
CVE-2024-53071
CVE-2024-53072
CVE-2024-53074
CVE-2024-53075
CVE-2024-53076
CVE-2024-53077
CVE-2024-53078
CVE-2024-53079
CVE-2024-53080
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53092
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53098
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53104
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53116
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53124
CVE-2024-53125
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53132
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53137
CVE-2024-53138
CVE-2024-53139
CVE-2024-53140
CVE-2024-53141
CVE-2024-53142
CVE-2024-53143
CVE-2024-53144
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53149
CVE-2024-53150
CVE-2024-53151
CVE-2024-53152
CVE-2024-53153
CVE-2024-53154
CVE-2024-53155
CVE-2024-53156
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53165
CVE-2024-53166
CVE-2024-53167
CVE-2024-53168
CVE-2024-53169
CVE-2024-53170
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53187
CVE-2024-53188
CVE-2024-53189
CVE-2024-53190
CVE-2024-53191
CVE-2024-53192
CVE-2024-53193
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53199
CVE-2024-53200
CVE-2024-53201
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53212
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53216
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56534
CVE-2024-56535
CVE-2024-56536
CVE-2024-56537
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56541
CVE-2024-56542
CVE-2024-56543
CVE-2024-56544
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56674
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56680
CVE-2024-56681
CVE-2024-56683
CVE-2024-56684
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56696
CVE-2024-56697
CVE-2024-56698
CVE-2024-56699
CVE-2024-56700
CVE-2024-56701
CVE-2024-56702
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56749
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2025-0927
USN-7311-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-49867, CVE-2024-47675, CVE-2024-49999, CVE-2024-49884, CVE-2024-49992, CVE-2024-49945, CVE-2024-49889, CVE-2024-49890, CVE-2024-49900, CVE-2024-49934, CVE-2024-49976, CVE-2024-49878, CVE-2024-50008, CVE-2024-49919, CVE-2024-47698, CVE-2024-47731, CVE-2024-47673, CVE-2024-49959, CVE-2024-47715, CVE-2024-49912, CVE-2024-47702, CVE-2024-50007, CVE-2024-49953, CVE-2024-49929, CVE-2024-47730, CVE-2024-49966, CVE-2024-47756, CVE-2024-47687, CVE-2024-50002, CVE-2024-49911, CVE-2024-47714, CVE-2024-47704, CVE-2024-50017, CVE-2024-47709, CVE-2024-49858, CVE-2024-47712, CVE-2024-49870, CVE-2024-49883, CVE-2024-47672, CVE-2024-49963, CVE-2024-49926, CVE-2024-49860, CVE-2024-47748, CVE-2024-49928, CVE-2024-49931, CVE-2024-47749, CVE-2024-49913, CVE-2024-49957, CVE-2024-49948, CVE-2024-47732, CVE-2024-47753, CVE-2024-47727, CVE-2024-49896, CVE-2024-47707, CVE-2024-47743, CVE-2024-49915, CVE-2024-47695, CVE-2024-49960, CVE-2024-49935, CVE-2024-49868, CVE-2024-49918, CVE-2024-49969, CVE-2024-53164, CVE-2024-49879, CVE-2024-50012, CVE-2024-50000, CVE-2024-49974, CVE-2024-49998, CVE-2024-49933, CVE-2024-47733, CVE-2024-49924, CVE-2024-47757, CVE-2024-47699, CVE-2024-49983, CVE-2024-50016, CVE-2024-49907, CVE-2024-49965, CVE-2024-49859, CVE-2024-50013, CVE-2024-49871, CVE-2024-49994, CVE-2024-49850, CVE-2024-49947, CVE-2024-49955, CVE-2024-49962, CVE-2024-47692, CVE-2024-53141, CVE-2024-50014, CVE-2024-47689, CVE-2024-49874, CVE-2024-50005, CVE-2024-47741, CVE-2024-49880, CVE-2024-47738, CVE-2024-47745, CVE-2024-49917, CVE-2024-47728, CVE-2024-49856, CVE-2024-49925, CVE-2024-47671, CVE-2023-52917, CVE-2024-47679, CVE-2024-49975, CVE-2024-47734, CVE-2024-47720, CVE-2024-47686, CVE-2024-49892, CVE-2024-49936, CVE-2024-49888, CVE-2024-49909, CVE-2024-49986, CVE-2024-49930, CVE-2024-47740, CVE-2024-49923, CVE-2024-47754, CVE-2024-50179, CVE-2024-49978, CVE-2024-47735, CVE-2024-49886, CVE-2024-49903, CVE-2024-47681, CVE-2024-49897, CVE-2024-49951, CVE-2024-49946, CVE-2024-49954, CVE-2024-47691, CVE-2024-49863, CVE-2024-47719, CVE-2024-47693, CVE-2024-47713, CVE-2024-50006, CVE-2024-49855, CVE-2024-49851, CVE-2024-49894, CVE-2024-49895, CVE-2024-49987, CVE-2024-47700, CVE-2024-47688, CVE-2024-49982, CVE-2024-47685, CVE-2024-53144, CVE-2024-47670, CVE-2024-47696, CVE-2024-47710, CVE-2024-47737, CVE-2024-49988, CVE-2024-47684, CVE-2024-47718, CVE-2024-49876, CVE-2024-49852, CVE-2024-49980, CVE-2024-49877, CVE-2024-50175, CVE-2024-49981, CVE-2024-47677, CVE-2024-49973, CVE-2024-49922, CVE-2024-50015, CVE-2024-49938, CVE-2024-47752, CVE-2024-49902, CVE-2024-49944, CVE-2024-49952, CVE-2024-47747, CVE-2024-41016, CVE-2024-50001, CVE-2024-49891, CVE-2024-47703, CVE-2024-47744, CVE-2024-49861, CVE-2024-49875, CVE-2024-49901, CVE-2024-49881, CVE-2024-49937, CVE-2024-47706, CVE-2024-47690, CVE-2024-49958, CVE-2024-49961, CVE-2024-49882, CVE-2024-47739, CVE-2024-49996, CVE-2024-49905, CVE-2024-47705, CVE-2024-49942, CVE-2024-47697, CVE-2024-47723, CVE-2024-49853, CVE-2024-49862, CVE-2024-47751, CVE-2024-49950, CVE-2024-50176, CVE-2024-49939, CVE-2024-49864, CVE-2024-49997, CVE-2024-49995, CVE-2024-49885, CVE-2024-49949, CVE-2024-53103, CVE-2024-49991, CVE-2024-49866, CVE-2024-49977, CVE-2024-47682, CVE-2024-49927, CVE-2024-49985, CVE-2024-49898, CVE-2024-47678, CVE-2024-47701, CVE-2024-47742, CVE-2024-47750, CVE-2024-47716, CVE-2024-49989) Update Instructions: Run `sudo pro fix USN-7311-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1023.25 linux-aws-cloud-tools-6.8.0-1023 - 6.8.0-1023.25 linux-aws-headers-6.8.0-1023 - 6.8.0-1023.25 linux-aws-lts-24.04 - 6.8.0-1023.25 linux-aws-tools-6.8.0-1023 - 6.8.0-1023.25 linux-buildinfo-6.8.0-1023-aws - 6.8.0-1023.25 linux-cloud-tools-6.8.0-1023-aws - 6.8.0-1023.25 linux-headers-6.8.0-1023-aws - 6.8.0-1023.25 linux-headers-aws - 6.8.0-1023.25 linux-headers-aws-lts-24.04 - 6.8.0-1023.25 linux-image-6.8.0-1023-aws - 6.8.0-1023.25 linux-image-aws - 6.8.0-1023.25 linux-image-aws-lts-24.04 - 6.8.0-1023.25 linux-image-unsigned-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-extra-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-extra-aws - 6.8.0-1023.25 linux-modules-extra-aws-lts-24.04 - 6.8.0-1023.25 linux-tools-6.8.0-1023-aws - 6.8.0-1023.25 linux-tools-aws - 6.8.0-1023.25 linux-tools-aws-lts-24.04 - 6.8.0-1023.25 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49969
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-53103
CVE-2024-53141
CVE-2024-53144
CVE-2024-53164
USN-7312-1 -- openNDS vulnerability
Ubuntu 24.04 LTS
It was discovered that openNDS did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7312-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: opennds - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 opennds-daemon - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 opennds-daemon-common - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-25763
USN-7313-1 -- Erlang vulnerability
Ubuntu 24.04 LTS
It was discovered that Erlang incorrectly handled SFTP packet sizes. A remote attacker could possibly use this issue to cause Erlang to consume resources, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7313-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.1 No subscription required
Medium
CVE-2025-26618
USN-7314-1 -- Kerberos vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461) It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462) It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528) Update Instructions: Run `sudo pro fix USN-7314-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.5 krb5-doc - 1.20.1-6ubuntu2.5 krb5-gss-samples - 1.20.1-6ubuntu2.5 krb5-k5tls - 1.20.1-6ubuntu2.5 krb5-kdc - 1.20.1-6ubuntu2.5 krb5-kdc-ldap - 1.20.1-6ubuntu2.5 krb5-kpropd - 1.20.1-6ubuntu2.5 krb5-locales - 1.20.1-6ubuntu2.5 krb5-multidev - 1.20.1-6ubuntu2.5 krb5-otp - 1.20.1-6ubuntu2.5 krb5-pkinit - 1.20.1-6ubuntu2.5 krb5-user - 1.20.1-6ubuntu2.5 libgssapi-krb5-2 - 1.20.1-6ubuntu2.5 libgssrpc4t64 - 1.20.1-6ubuntu2.5 libk5crypto3 - 1.20.1-6ubuntu2.5 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.5 libkadm5srv-mit12 - 1.20.1-6ubuntu2.5 libkdb5-10t64 - 1.20.1-6ubuntu2.5 libkrad-dev - 1.20.1-6ubuntu2.5 libkrad0 - 1.20.1-6ubuntu2.5 libkrb5-3 - 1.20.1-6ubuntu2.5 libkrb5-dev - 1.20.1-6ubuntu2.5 libkrb5support0 - 1.20.1-6ubuntu2.5 No subscription required
Medium
CVE-2024-26458
CVE-2024-26461
CVE-2024-26462
CVE-2025-24528
USN-7315-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
Stephen Fewer discovered that PostgreSQL incorrectly handled quoting syntax in certain scenarios. A remote attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-7315-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.8-0ubuntu0.24.04.1 libecpg-dev - 16.8-0ubuntu0.24.04.1 libecpg6 - 16.8-0ubuntu0.24.04.1 libpgtypes3 - 16.8-0ubuntu0.24.04.1 libpq-dev - 16.8-0ubuntu0.24.04.1 libpq5 - 16.8-0ubuntu0.24.04.1 postgresql-16 - 16.8-0ubuntu0.24.04.1 postgresql-client-16 - 16.8-0ubuntu0.24.04.1 postgresql-doc-16 - 16.8-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.8-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.8-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.8-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.8-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-1094
USN-7316-1 -- Raptor vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Raptor incorrectly handled memory operations when processing certain input files. A remote attacker could possibly use this issue to cause Raptor to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2020-25713) It was discovered that Raptor incorrectly handled parsing certain tuples. A remote attacker could possibly use this issue to cause Raptor to crash, resulting in a denial of service. (CVE-2024-57822) It was discovered that Raptor incorrectly handled parsing certain turtles. A remote attacker could use this issue to cause Raptor to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-57823) Update Instructions: Run `sudo pro fix USN-7316-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libraptor2-0 - 2.0.16-3ubuntu0.1 libraptor2-dev - 2.0.16-3ubuntu0.1 libraptor2-doc - 2.0.16-3ubuntu0.1 raptor2-utils - 2.0.16-3ubuntu0.1 No subscription required
Medium
CVE-2020-25713
CVE-2024-57822
CVE-2024-57823
USN-7317-1 -- wpa_supplicant and hostapd vulnerabilities
Ubuntu 24.04 LTS
George Chatzisofroniou and Panayiotis Kotzanikolaou discovered that wpa_supplicant and hostapd reused encryption elements in the PKEX protocol. An attacker could possibly use this issue to impersonate a wireless access point, and obtain sensitive information. (CVE-2022-37660) Daniel De Almeida Braga, Mohamed Sabt, and Pierre-Alain Fouque discovered that wpa_supplicant and hostapd were vulnerable to side channel attacks due to the cache access patterns. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-23303, CVE-2022-23304) Update Instructions: Run `sudo pro fix USN-7317-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.2 hostapd - 2:2.10-21ubuntu0.2 libwpa-client-dev - 2:2.10-21ubuntu0.2 wpagui - 2:2.10-21ubuntu0.2 wpasupplicant - 2:2.10-21ubuntu0.2 No subscription required
Medium
CVE-2022-23303
CVE-2022-23304
CVE-2022-37660
USN-7319-1 -- cmark-gfm vulnerabilities
Ubuntu 24.04 LTS
It was discovered that cmark-gfm's autolink extension did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39209) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-22483) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-22484) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-22486, CVE-2023-26485) Update Instructions: Run `sudo pro fix USN-7319-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cmark-gfm - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-dev - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-extensions-dev - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-extensions0.29.0.gfm.6 - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm0.29.0.gfm.6 - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-39209
CVE-2023-22483
CVE-2023-22484
CVE-2023-22486
CVE-2023-26485
USN-7320-1 -- GPAC vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the GPAC MP4Box utility incorrectly handled certain AC3 files, which could lead to an out-of-bounds read. A remote attacker could use this issue to cause MP4Box to crash, resulting in a denial of service (system crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-5520, CVE-2024-0322) It was discovered that the GPAC MP4Box utility incorrectly handled certain malformed text files. If a user or automated system using MP4Box were tricked into opening a specially crafted RST file, an attacker could use this issue to cause a denial of service (system crash) or execute arbitrary code. (CVE-2024-0321) Update Instructions: Run `sudo pro fix USN-7320-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gpac - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 gpac-modules-base - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 libgpac-dev - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 libgpac12t64 - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-5520
CVE-2024-0321
CVE-2024-0322
USN-7321-1 -- Redis vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Redis incorrectly handled certain memory operations during pattern matching. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-31228) It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-46981) It was discovered that Redis incorrectly handled some malformed ACL selectors. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.10 and Ubuntu 24.04 LTS. (CVE-2024-51741) Update Instructions: Run `sudo pro fix USN-7321-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: redis - 5:7.0.15-1ubuntu0.24.04.1 redis-sentinel - 5:7.0.15-1ubuntu0.24.04.1 redis-server - 5:7.0.15-1ubuntu0.24.04.1 redis-tools - 5:7.0.15-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-31228
CVE-2024-46981
CVE-2024-51741
USN-7322-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - Networking core; (CVE-2024-56672, CVE-2024-56658) Update Instructions: Run `sudo pro fix USN-7322-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1016-oem - 6.11.0-1016.16 linux-headers-6.11.0-1016-oem - 6.11.0-1016.16 linux-headers-oem-24.04b - 6.11.0-1016.16 linux-image-6.11.0-1016-oem - 6.11.0-1016.16 linux-image-oem-24.04b - 6.11.0-1016.16 linux-image-uc-6.11.0-1016-oem - 6.11.0-1016.16 linux-image-uc-oem-24.04b - 6.11.0-1016.16 linux-image-unsigned-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu6-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu6-oem-24.04b - 6.11.0-1016.16 linux-modules-ipu7-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu7-oem-24.04b - 6.11.0-1016.16 linux-modules-iwlwifi-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1016.16 linux-modules-usbio-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-usbio-oem-24.04b - 6.11.0-1016.16 linux-modules-vision-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-vision-oem-24.04b - 6.11.0-1016.16 linux-oem-24.04b - 6.11.0-1016.16 linux-oem-6.11-headers-6.11.0-1016 - 6.11.0-1016.16 linux-oem-6.11-tools-6.11.0-1016 - 6.11.0-1016.16 linux-tools-6.11.0-1016-oem - 6.11.0-1016.16 linux-tools-oem-24.04b - 6.11.0-1016.16 No subscription required
High
CVE-2024-56658
CVE-2024-56672
USN-7323-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - Networking core; (CVE-2024-56672, CVE-2024-56658) Update Instructions: Run `sudo pro fix USN-7323-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-buildinfo-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-cloud-tools-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-headers-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-hwe-6.11-headers-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-hwe-6.11-tools-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-image-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-uc-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-uc-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-unsigned-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-unsigned-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-modules-extra-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu6-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-ipu7-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-usbio-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-vision-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-tools-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 No subscription required
High
CVE-2024-56658
CVE-2024-56672
CVE-2025-0927
USN-7324-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7324-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-bpf-dev - 6.8.0-55.57 linux-buildinfo-6.8.0-55-generic - 6.8.0-55.57 linux-buildinfo-6.8.0-55-generic-64k - 6.8.0-55.57 linux-cloud-tools-6.8.0-55 - 6.8.0-55.57 linux-cloud-tools-6.8.0-55-generic - 6.8.0-55.57 linux-cloud-tools-common - 6.8.0-55.57 linux-cloud-tools-generic - 6.8.0-55.57 linux-cloud-tools-virtual - 6.8.0-55.57 linux-crashdump - 6.8.0-55.57 linux-doc - 6.8.0-55.57 linux-generic - 6.8.0-55.57 linux-generic-64k - 6.8.0-55.57 linux-generic-lpae - 6.8.0-55.57 linux-headers-6.8.0-55 - 6.8.0-55.57 linux-headers-6.8.0-55-generic - 6.8.0-55.57 linux-headers-6.8.0-55-generic-64k - 6.8.0-55.57 linux-headers-generic - 6.8.0-55.57 linux-headers-generic-64k - 6.8.0-55.57 linux-headers-generic-lpae - 6.8.0-55.57 linux-headers-kvm - 6.8.0-55.57 linux-headers-laptop-23.10 - 6.8.0-55.57 linux-headers-oem-20.04 - 6.8.0-55.57 linux-headers-oem-20.04b - 6.8.0-55.57 linux-headers-oem-20.04c - 6.8.0-55.57 linux-headers-oem-20.04d - 6.8.0-55.57 linux-headers-oem-22.04 - 6.8.0-55.57 linux-headers-virtual - 6.8.0-55.57 linux-image-6.8.0-55-generic - 6.8.0-55.57 linux-image-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-extra-virtual - 6.8.0-55.57 linux-image-generic - 6.8.0-55.57 linux-image-generic-64k - 6.8.0-55.57 linux-image-generic-lpae - 6.8.0-55.57 linux-image-kvm - 6.8.0-55.57 linux-image-laptop-23.10 - 6.8.0-55.57 linux-image-oem-20.04 - 6.8.0-55.57 linux-image-oem-20.04b - 6.8.0-55.57 linux-image-oem-20.04c - 6.8.0-55.57 linux-image-oem-20.04d - 6.8.0-55.57 linux-image-oem-22.04 - 6.8.0-55.57 linux-image-uc-6.8.0-55-generic - 6.8.0-55.57 linux-image-uc-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-uc-generic - 6.8.0-55.57 linux-image-unsigned-6.8.0-55-generic - 6.8.0-55.57 linux-image-unsigned-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-virtual - 6.8.0-55.57 linux-kvm - 6.8.0-55.57 linux-laptop-23.10 - 6.8.0-55.57 linux-lib-rust-6.8.0-55-generic - 6.8.0-55.57 linux-libc-dev - 6.8.0-55.57 linux-modules-6.8.0-55-generic - 6.8.0-55.57 linux-modules-6.8.0-55-generic-64k - 6.8.0-55.57 linux-modules-extra-6.8.0-55-generic - 6.8.0-55.57 linux-modules-ipu6-6.8.0-55-generic - 6.8.0-55.57 linux-modules-ipu6-generic - 6.8.0-55.57 linux-modules-iwlwifi-6.8.0-55-generic - 6.8.0-55.57 linux-modules-iwlwifi-generic - 6.8.0-55.57 linux-modules-iwlwifi-oem-20.04 - 6.8.0-55.57 linux-modules-iwlwifi-oem-20.04d - 6.8.0-55.57 linux-modules-iwlwifi-oem-22.04 - 6.8.0-55.57 linux-modules-usbio-6.8.0-55-generic - 6.8.0-55.57 linux-modules-usbio-generic - 6.8.0-55.57 linux-oem-20.04 - 6.8.0-55.57 linux-oem-20.04b - 6.8.0-55.57 linux-oem-20.04c - 6.8.0-55.57 linux-oem-20.04d - 6.8.0-55.57 linux-oem-22.04 - 6.8.0-55.57 linux-source - 6.8.0-55.57 linux-source-6.8.0 - 6.8.0-55.57 linux-tools-6.8.0-55 - 6.8.0-55.57 linux-tools-6.8.0-55-generic - 6.8.0-55.57 linux-tools-6.8.0-55-generic-64k - 6.8.0-55.57 linux-tools-common - 6.8.0-55.57 linux-tools-generic - 6.8.0-55.57 linux-tools-generic-64k - 6.8.0-55.57 linux-tools-generic-lpae - 6.8.0-55.57 linux-tools-host - 6.8.0-55.57 linux-tools-kvm - 6.8.0-55.57 linux-tools-laptop-23.10 - 6.8.0-55.57 linux-tools-oem-20.04 - 6.8.0-55.57 linux-tools-oem-20.04b - 6.8.0-55.57 linux-tools-oem-20.04c - 6.8.0-55.57 linux-tools-oem-20.04d - 6.8.0-55.57 linux-tools-oem-22.04 - 6.8.0-55.57 linux-tools-virtual - 6.8.0-55.57 linux-virtual - 6.8.0-55.57 No subscription required linux-buildinfo-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-buildinfo-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-cloud-tools-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-cloud-tools-lowlatency - 6.8.0-55.57.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-headers-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-headers-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-headers-lowlatency - 6.8.0-55.57.1 linux-headers-lowlatency-64k - 6.8.0-55.57.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-image-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-image-lowlatency - 6.8.0-55.57.1 linux-image-lowlatency-64k - 6.8.0-55.57.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-unsigned-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-image-unsigned-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-lowlatency - 6.8.0-55.57.1 linux-lowlatency-64k - 6.8.0-55.57.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-lowlatency-cloud-tools-6.8.0-55 - 6.8.0-55.57.1 linux-lowlatency-headers-6.8.0-55 - 6.8.0-55.57.1 linux-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-lowlatency-lib-rust-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-lowlatency-tools-6.8.0-55 - 6.8.0-55.57.1 linux-modules-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-modules-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-modules-iwlwifi-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-modules-iwlwifi-lowlatency - 6.8.0-55.57.1 linux-tools-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-tools-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-tools-lowlatency - 6.8.0-55.57.1 linux-tools-lowlatency-64k - 6.8.0-55.57.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 No subscription required
High
CVE-2024-53104
USN-7325-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-raspi - 6.8.0-1020.24 linux-headers-6.8.0-1020-raspi - 6.8.0-1020.24 linux-headers-raspi - 6.8.0-1020.24 linux-image-6.8.0-1020-raspi - 6.8.0-1020.24 linux-image-raspi - 6.8.0-1020.24 linux-modules-6.8.0-1020-raspi - 6.8.0-1020.24 linux-raspi - 6.8.0-1020.24 linux-raspi-headers-6.8.0-1020 - 6.8.0-1020.24 linux-raspi-tools-6.8.0-1020 - 6.8.0-1020.24 linux-tools-6.8.0-1020-raspi - 6.8.0-1020.24 linux-tools-raspi - 6.8.0-1020.24 No subscription required linux-buildinfo-6.8.0-1021-oracle - 6.8.0-1021.22 linux-buildinfo-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-headers-6.8.0-1021-oracle - 6.8.0-1021.22 linux-headers-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-headers-oracle - 6.8.0-1021.22 linux-headers-oracle-64k - 6.8.0-1021.22 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-headers-oracle-lts-24.04 - 6.8.0-1021.22 linux-image-6.8.0-1021-oracle - 6.8.0-1021.22 linux-image-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-image-oracle - 6.8.0-1021.22 linux-image-oracle-64k - 6.8.0-1021.22 linux-image-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-image-oracle-lts-24.04 - 6.8.0-1021.22 linux-image-unsigned-6.8.0-1021-oracle - 6.8.0-1021.22 linux-image-unsigned-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-modules-6.8.0-1021-oracle - 6.8.0-1021.22 linux-modules-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-modules-extra-6.8.0-1021-oracle - 6.8.0-1021.22 linux-modules-extra-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-oracle - 6.8.0-1021.22 linux-oracle-64k - 6.8.0-1021.22 linux-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-oracle-headers-6.8.0-1021 - 6.8.0-1021.22 linux-oracle-lts-24.04 - 6.8.0-1021.22 linux-oracle-tools-6.8.0-1021 - 6.8.0-1021.22 linux-tools-6.8.0-1021-oracle - 6.8.0-1021.22 linux-tools-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-tools-oracle - 6.8.0-1021.22 linux-tools-oracle-64k - 6.8.0-1021.22 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-tools-oracle-lts-24.04 - 6.8.0-1021.22 No subscription required linux-aws - 6.8.0-1024.26 linux-aws-cloud-tools-6.8.0-1024 - 6.8.0-1024.26 linux-aws-headers-6.8.0-1024 - 6.8.0-1024.26 linux-aws-lts-24.04 - 6.8.0-1024.26 linux-aws-tools-6.8.0-1024 - 6.8.0-1024.26 linux-buildinfo-6.8.0-1024-aws - 6.8.0-1024.26 linux-cloud-tools-6.8.0-1024-aws - 6.8.0-1024.26 linux-headers-6.8.0-1024-aws - 6.8.0-1024.26 linux-headers-aws - 6.8.0-1024.26 linux-headers-aws-lts-24.04 - 6.8.0-1024.26 linux-image-6.8.0-1024-aws - 6.8.0-1024.26 linux-image-aws - 6.8.0-1024.26 linux-image-aws-lts-24.04 - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-extra-aws - 6.8.0-1024.26 linux-modules-extra-aws-lts-24.04 - 6.8.0-1024.26 linux-tools-6.8.0-1024-aws - 6.8.0-1024.26 linux-tools-aws - 6.8.0-1024.26 linux-tools-aws-lts-24.04 - 6.8.0-1024.26 No subscription required
High
CVE-2024-53104
CVE-2025-0927
USN-7325-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-buildinfo-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-cloud-tools-nvidia - 6.8.0-1023.26 linux-headers-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-headers-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-headers-nvidia - 6.8.0-1023.26 linux-headers-nvidia-64k - 6.8.0-1023.26 linux-image-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-image-nvidia - 6.8.0-1023.26 linux-image-nvidia-64k - 6.8.0-1023.26 linux-image-uc-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-uc-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-image-unsigned-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-unsigned-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-extra-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-nvidia-fs-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1023.26 linux-nvidia - 6.8.0-1023.26 linux-nvidia-64k - 6.8.0-1023.26 linux-nvidia-headers-6.8.0-1023 - 6.8.0-1023.26 linux-nvidia-tools-6.8.0-1023 - 6.8.0-1023.26 linux-tools-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-tools-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-tools-nvidia - 6.8.0-1023.26 linux-tools-nvidia-64k - 6.8.0-1023.26 No subscription required
High
CVE-2024-53104
CVE-2025-0927
USN-7325-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-buildinfo-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-headers-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-uc-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-uc-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-unsigned-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-unsigned-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-extra-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-nvidia-lowlatency - 6.8.0-1023.26.1 linux-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-nvidia-lowlatency-headers-6.8.0-1023 - 6.8.0-1023.26.1 linux-nvidia-lowlatency-tools-6.8.0-1023 - 6.8.0-1023.26.1 linux-tools-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-tools-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-tools-nvidia-lowlatency - 6.8.0-1023.26.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1023.26.1 No subscription required
High
CVE-2024-53104
CVE-2025-0927
USN-7326-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; - Network drivers; (CVE-2024-50274, CVE-2024-53104, CVE-2024-53064) Update Instructions: Run `sudo pro fix USN-7326-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-cloud-tools-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-cloud-tools-gkeop - 6.8.0-1007.9 linux-cloud-tools-gkeop-6.8 - 6.8.0-1007.9 linux-gkeop - 6.8.0-1007.9 linux-gkeop-6.8 - 6.8.0-1007.9 linux-gkeop-cloud-tools-6.8.0-1007 - 6.8.0-1007.9 linux-gkeop-headers-6.8.0-1007 - 6.8.0-1007.9 linux-gkeop-tools-6.8.0-1007 - 6.8.0-1007.9 linux-headers-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-headers-gkeop - 6.8.0-1007.9 linux-headers-gkeop-6.8 - 6.8.0-1007.9 linux-image-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-image-gkeop - 6.8.0-1007.9 linux-image-gkeop-6.8 - 6.8.0-1007.9 linux-image-unsigned-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-extra-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-extra-gkeop - 6.8.0-1007.9 linux-modules-extra-gkeop-6.8 - 6.8.0-1007.9 linux-tools-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-tools-gkeop - 6.8.0-1007.9 linux-tools-gkeop-6.8 - 6.8.0-1007.9 No subscription required linux-buildinfo-6.8.0-1020-gke - 6.8.0-1020.24 linux-gke - 6.8.0-1020.24 linux-gke-headers-6.8.0-1020 - 6.8.0-1020.24 linux-gke-tools-6.8.0-1020 - 6.8.0-1020.24 linux-headers-6.8.0-1020-gke - 6.8.0-1020.24 linux-headers-gke - 6.8.0-1020.24 linux-image-6.8.0-1020-gke - 6.8.0-1020.24 linux-image-gke - 6.8.0-1020.24 linux-image-unsigned-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-extra-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-iwlwifi-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-iwlwifi-gke - 6.8.0-1020.24 linux-tools-6.8.0-1020-gke - 6.8.0-1020.24 linux-tools-gke - 6.8.0-1020.24 No subscription required linux-buildinfo-6.8.0-1025-gcp - 6.8.0-1025.27 linux-buildinfo-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-gcp - 6.8.0-1025.27 linux-gcp-64k - 6.8.0-1025.27 linux-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-gcp-headers-6.8.0-1025 - 6.8.0-1025.27 linux-gcp-lts-24.04 - 6.8.0-1025.27 linux-gcp-tools-6.8.0-1025 - 6.8.0-1025.27 linux-headers-6.8.0-1025-gcp - 6.8.0-1025.27 linux-headers-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-headers-gcp - 6.8.0-1025.27 linux-headers-gcp-64k - 6.8.0-1025.27 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-headers-gcp-lts-24.04 - 6.8.0-1025.27 linux-image-6.8.0-1025-gcp - 6.8.0-1025.27 linux-image-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-image-gcp - 6.8.0-1025.27 linux-image-gcp-64k - 6.8.0-1025.27 linux-image-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-image-gcp-lts-24.04 - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-gcp - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-6.8.0-1025-gcp - 6.8.0-1025.27 linux-modules-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-gcp - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-extra-gcp - 6.8.0-1025.27 linux-modules-extra-gcp-64k - 6.8.0-1025.27 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1025.27 linux-tools-6.8.0-1025-gcp - 6.8.0-1025.27 linux-tools-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-tools-gcp - 6.8.0-1025.27 linux-tools-gcp-64k - 6.8.0-1025.27 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-tools-gcp-lts-24.04 - 6.8.0-1025.27 No subscription required
High
CVE-2024-50274
CVE-2024-53064
CVE-2024-53104
CVE-2025-0927
USN-7335-1 -- Django vulnerability
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled text wrapping. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7335-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.6 python3-django - 3:4.2.11-1ubuntu1.6 No subscription required
Medium
CVE-2025-26699
USN-7336-1 -- GNU Chess vulnerability
Ubuntu 24.04 LTS
Michael Vaughan discovered an overflow vulnerability in GNU Chess that occurs when reading a specially crafted Portable Game Notation (PGN) file. An attacker could possibly use this issue to cause GNU Chess to crash, resulting in a denial of service, or the execution of arbitrary code. Update Instructions: Run `sudo pro fix USN-7336-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnuchess - 6.2.7-1+deb11u1build0.24.04.1 No subscription required
Medium
CVE-2021-30184
USN-7337-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
It was discovered that LibreOffice incorrectly handled Office URI Schemes. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to call internal macros. Update Instructions: Run `sudo pro fix USN-7337-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.3 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.3 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.3 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.3 libjuh-java - 4:24.2.7-0ubuntu0.24.04.3 libjurt-java - 4:24.2.7-0ubuntu0.24.04.3 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.3 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.3 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.3 libreoffice - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.3 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.3 libridl-java - 4:24.2.7-0ubuntu0.24.04.3 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libunoil-java - 4:24.2.7-0ubuntu0.24.04.3 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.3 python3-access2base - 4:24.2.7-0ubuntu0.24.04.3 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.3 python3-uno - 4:24.2.7-0ubuntu0.24.04.3 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.3 ure - 4:24.2.7-0ubuntu0.24.04.3 ure-java - 4:24.2.7-0ubuntu0.24.04.3 No subscription required
Medium
CVE-2025-1080
USN-7341-1 -- FreeRDP vulnerabilities
Ubuntu 24.04 LTS
Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-32039, CVE-2024-32040, CVE-2024-32041) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32458, CVE-2024-32460) It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32661) Update Instructions: Run `sudo pro fix USN-7341-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-shadow-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-wayland - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-client2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-server2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-shadow-subsystem2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-shadow2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libuwac0-0t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libuwac0-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr-tools2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 winpr-utils - 2.11.5+dfsg1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-32039
CVE-2024-32040
CVE-2024-32041
CVE-2024-32460
CVE-2024-32658
CVE-2024-32661
USN-7343-1 -- Jinja2 vulnerabilities
Ubuntu 24.04 LTS
Rafal Krupinski discovered that Jinja2 did not properly restrict the execution of code in situations where templates are used maliciously. An attacker with control over a template's filename and content could potentially use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2024-56201) It was discovered that Jinja2 sandboxed environments could be escaped through a call to a string format method. An attacker could possibly use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2024-56326) It was discovered that Jinja2 sandboxed environments could be escaped through the malicious use of certain filters. An attacker could possibly use this issue to enable the execution of arbitrary code. (CVE-2025-27516) Update Instructions: Run `sudo pro fix USN-7343-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.3 python3-jinja2 - 3.1.2-1ubuntu1.3 No subscription required
Medium
CVE-2024-56201
CVE-2024-56326
CVE-2025-27516
USN-7345-1 -- .NET vulnerability
Ubuntu 24.04 LTS
Zahid TOKAT discovered that .NET suffered from a weak authentication vulnerability. An attacker could possibly use this issue to elevate privileges. Update Instructions: Run `sudo pro fix USN-7345-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.114-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.114-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.114-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.114-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.114-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.114-8.0.14-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.14-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.14-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2025-24070
USN-7346-1 -- OpenSC vulnerabilities
Ubuntu 24.04 LTS
It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a use-after-free vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-42780) It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a stack buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-42782) It was discovered that OpenSC did not correctly handle the length of certain buffers, which could lead to a out-of-bounds access vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-2977) Deepanjan Pal discovered that OpenSC did not correctly authenticate a zero length PIN. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-40660) It was discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to compromise key generation, certificate loading and other card management operations. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-40661) Hubert Kario, Michal Shagam and Eyal Ronen discovered that OpenSC had a timing side-channel and incorrectly handled RSA padding. An attacker could possibly use this issue to recover sensitive information. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-5992) Matteo Marini discovered that OpenSC did not properly manage memory due to certain uninitialized variables. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45615) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45616, CVE-2024-45617) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. (CVE-2024-45618, CVE-2024-45620) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45619) It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a buffer overflow. A physically proximate attacker could possibly use this issue to compromise card management operations during enrollment and modification. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-8443) Update Instructions: Run `sudo pro fix USN-7346-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: opensc - 0.25.0~rc1-1ubuntu0.1~esm1 opensc-pkcs11 - 0.25.0~rc1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-42780
CVE-2021-42782
CVE-2023-2977
CVE-2023-40660
CVE-2023-40661
CVE-2023-5992
CVE-2024-45615
CVE-2024-45616
CVE-2024-45617
CVE-2024-45618
CVE-2024-45619
CVE-2024-45620
CVE-2024-8443
USN-7347-1 -- Netatalk vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Netatalk did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-38439, CVE-2024-38440, CVE-2024-38441) Update Instructions: Run `sudo pro fix USN-7347-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netatalk - 3.1.18~ds-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-38439
CVE-2024-38440
CVE-2024-38441
USN-7351-1 -- RESTEasy vulnerabilities
Ubuntu 24.04 LTS
Nikos Papadopoulos discovered that RESTEasy improperly handled URL encoding when certain errors occur. An attacker could possibly use this issue to modify the app's behavior for other users through the network. (CVE-2020-10688) Mirko Selber discovered that RESTEasy improperly validated user input during HTTP response construction. This issue could possibly allow an attacker to cause a denial of service or execute arbitrary code. (CVE-2020-1695) It was discovered that RESTEasy unintentionally disclosed potentially sensitive server information to users during the handling of certain errors. (CVE-2020-25633) It was discovered that RESTEasy unintentionally disclosed parts of its code to users during the handling of certain errors. (CVE-2021-20289) It was discovered that RESTEasy used improper permissions when creating temporary files. An attacker could possibly use this issue to get access to sensitive data. (CVE-2023-0482) It was discovered that RESTEasy improperly handled certain HTTP requests and could be forced into a state in which it can no longer accept incoming connections. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-9622) Update Instructions: Run `sudo pro fix USN-7351-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libresteasy-java - 3.6.2-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2020-10688
CVE-2020-1695
CVE-2020-25633
CVE-2021-20289
CVE-2023-0482
CVE-2024-9622
USN-7353-1 -- PlantUML vulnerability
Ubuntu 24.04 LTS
Tobias S. Fink discovered that PlantUML was susceptible to cross-site scripting attacks (XSS) in instances where SVG images were rendered. An attacker could possibly use this issue to cause PlantUML to crash, resulting in a denial of service, or the execution of arbitrary code. Update Instructions: Run `sudo pro fix USN-7353-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plantuml - 1:1.2020.2+ds-3ubuntu1.1 No subscription required
Medium
CVE-2022-1231
USN-7354-1 -- djoser vulnerability
Ubuntu 24.04 LTS
Diego Cebrián discovered that djoser did not properly handle user authentication. An attacker with valid credentials could possibly use this to bypass authentication checks, such as two-factor authentication, to gain unintended access. Update Instructions: Run `sudo pro fix USN-7354-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-djoser - 2.1.0-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-21543
USN-7355-1 -- RestrictedPython vulnerabilities
Ubuntu 24.04 LTS
Nakul Choudhary and Robert Xiao discovered that RestrictedPython did not properly sanitize certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-37271) Abhishek Govindarasu, Ankush Menat and Ward Theunisse discovered that RestrictedPython did not correctly handle certain format strings. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-41039) It was discovered that RestrictedPython did not correctly restrict access to certain fields. An attacker could possibly use this issue to leak sensitive information. (CVE-2024-47532) It was discovered that RestrictedPython contained a type confusion vulnerability. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-22153) Update Instructions: Run `sudo pro fix USN-7355-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-restrictedpython - 6.2-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-37271
CVE-2023-41039
CVE-2024-47532
CVE-2025-22153
USN-7356-1 -- uriparser vulnerabilities
Ubuntu 24.04 LTS
It was discovered that uriparser did not correctly handle certain inputs, which could lead to an integer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-34402, CVE-2024-34403) Update Instructions: Run `sudo pro fix USN-7356-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liburiparser-dev - 0.9.7+dfsg-2ubuntu0.1~esm1 liburiparser-doc - 0.9.7+dfsg-2ubuntu0.1~esm1 liburiparser1 - 0.9.7+dfsg-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-34402
CVE-2024-34403
USN-7357-1 -- Libxslt vulnerability
Ubuntu 24.04 LTS
Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7357-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.39-0exp1ubuntu0.24.04.1 libxslt1.1 - 1.1.39-0exp1ubuntu0.24.04.1 xsltproc - 1.1.39-0exp1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-55549
USN-7359-1 -- Valkey vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Valkey did not properly handle memory cleanup. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-46981) It was discovered that Valkey did not properly handle resource access permissions. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-51741) Update Instructions: Run `sudo pro fix USN-7359-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: valkey-redis-compat - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-sentinel - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-server - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-tools - 7.2.8+dfsg1-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-46981
CVE-2024-51741
USN-7361-1 -- Libxslt vulnerability
Ubuntu 24.04 LTS
Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7361-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.39-0exp1ubuntu0.24.04.2 libxslt1.1 - 1.1.39-0exp1ubuntu0.24.04.2 xsltproc - 1.1.39-0exp1ubuntu0.24.04.2 No subscription required
Medium
CVE-2025-24855
USN-7362-1 -- go-gh vulnerability
Ubuntu 24.04 LTS
It was discovered that go-gh incorrectly handled authentication tokens. An attacker could possibly use this issue to leak authentication tokens to the wrong host. (CVE-2024-53859) Update Instructions: Run `sudo pro fix USN-7362-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-cli-go-gh-v2-dev - 2.6.0-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-53859
USN-7363-1 -- PAM-PKCS#11 vulnerabilities
Ubuntu 24.04 LTS
Marcus Rückert and Matthias Gerstner discovered that PAM-PKCS#11 did not properly handle certain return codes when authentication was not possible. An attacker could possibly use this issue to bypass authentication. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-24531) It was discovered that PAM-PKCS#11 did not require a private key signature for authentication by default. An attacker could possibly use this issue to bypass authentication. (CVE-2025-24032) Update Instructions: Run `sudo pro fix USN-7363-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpam-pkcs11 - 0.6.12-2ubuntu0.24.04.1 No subscription required
High
CVE-2025-24032
CVE-2025-24531
USN-7364-1 -- OpenSAML vulnerability
Ubuntu 24.04 LTS
Alexander Tan discovered that the OpenSAML C++ library was susceptible to forging of signed SAML messages. An attacker could possibly use this issue to gain unauthorized access to a system and manipulate sensitive information. Update Instructions: Run `sudo pro fix USN-7364-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsaml-dev - 3.2.1-4.1ubuntu0.24.04.1 libsaml-doc - 3.2.1-4.1ubuntu0.24.04.1 libsaml12t64 - 3.2.1-4.1ubuntu0.24.04.1 opensaml-schemas - 3.2.1-4.1ubuntu0.24.04.1 opensaml-tools - 3.2.1-4.1ubuntu0.24.04.1 No subscription required
None
https://launchpad.net/bugs/2103420
USN-7366-1 -- Rack vulnerabilities
Ubuntu 24.04 LTS
Nhật Thái Đỗ discovered that Rack incorrectly handled certain usernames. A remote attacker could possibly use this issue to perform CRLF injection. (CVE-2025-25184) Phạm Quang Minh discovered that Rack incorrectly handled certain headers. A remote attacker could possibly use this issue to perform log injection. (CVE-2025-27111) Phạm Quang Minh discovered that Rack did not properly handle relative file paths. A remote attacker could potentially exploit this to include local files that should have been inaccessible. (CVE-2025-27610) Update Instructions: Run `sudo pro fix USN-7366-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.2 No subscription required
Medium
CVE-2025-25184
CVE-2025-27111
CVE-2025-27610
USN-7367-1 -- zvbi vulnerabilities
Ubuntu 24.04 LTS
It was discovered that zvbi incorrectly handled memory when processing user input. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7367-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libzvbi-common - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi-dev - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi-doc - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi0t64 - 0.2.42-2ubuntu0.24.04.1~esm1 zvbi - 0.2.42-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2025-2173
CVE-2025-2174
CVE-2025-2175
CVE-2025-2176
CVE-2025-2177
USN-7369-1 -- elfutils vulnerabilities
Ubuntu 24.04 LTS
It was discovered that readelf from elfutils could be made to read out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-25260) It was discovered that readelf from elfutils could be made to write out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1371) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. (CVE-2025-1372) It was discovered that strip from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running strip on a specially crafted file, an attacker could cause strip to crash, resulting in a denial of service. (CVE-2025-1377) Update Instructions: Run `sudo pro fix USN-7369-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: debuginfod - 0.190-1.1ubuntu0.1 elfutils - 0.190-1.1ubuntu0.1 libasm-dev - 0.190-1.1ubuntu0.1 libasm1t64 - 0.190-1.1ubuntu0.1 libdebuginfod-common - 0.190-1.1ubuntu0.1 libdebuginfod-dev - 0.190-1.1ubuntu0.1 libdebuginfod1t64 - 0.190-1.1ubuntu0.1 libdw-dev - 0.190-1.1ubuntu0.1 libdw1t64 - 0.190-1.1ubuntu0.1 libelf-dev - 0.190-1.1ubuntu0.1 libelf1t64 - 0.190-1.1ubuntu0.1 No subscription required
Medium
CVE-2024-25260
CVE-2025-1365
CVE-2025-1371
CVE-2025-1372
CVE-2025-1377
USN-7370-1 -- SmartDNS vulnerabilities
Ubuntu 24.04 LTS
It was discovered that SmartDNS did not correctly align certain objects in memory, leading to undefined behaviour. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2024-24198, CVE-2024-24199) It was discovered that SmartDNS did not correctly handle certain inputs, which could lead to an integer overflow. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-42643) Update Instructions: Run `sudo pro fix USN-7370-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smartdns - 45+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-24198
CVE-2024-24199
CVE-2024-42643
USN-7371-1 -- FreeRDP vulnerabilities
Ubuntu 24.04 LTS
Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32458) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause FreeRDP clients and servers to crash, resulting in a denial of service. (CVE-2024-32459) It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32659, CVE-2024-32660) Update Instructions: Run `sudo pro fix USN-7371-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-shadow-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-wayland - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-client2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-server2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-shadow-subsystem2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-shadow2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libuwac0-0t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libuwac0-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr-tools2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 winpr-utils - 2.11.5+dfsg1-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Low
CVE-2024-32458
CVE-2024-32459
CVE-2024-32659
CVE-2024-32660
USN-7373-1 -- Exim vulnerability
Ubuntu 24.04 LTS
It was discovered that Exim incorrectly handled certain memory operations. A remote attacker could use this issue to cause Exim to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7373-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.3 exim4-base - 4.97-4ubuntu4.3 exim4-config - 4.97-4ubuntu4.3 exim4-daemon-heavy - 4.97-4ubuntu4.3 exim4-daemon-light - 4.97-4ubuntu4.3 exim4-dev - 4.97-4ubuntu4.3 eximon4 - 4.97-4ubuntu4.3 No subscription required
Medium
CVE-2025-30232
USN-7374-1 -- containerd vulnerability
Ubuntu 24.04 LTS
Benjamin Koltermann discovered that containerd incorrectly handled large user id values. This could result in containers possibly being run as root, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7374-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-containerd-containerd-dev - 1.6.24~ds1-1ubuntu1.2+esm1 No subscription required containerd - 1.7.24-0ubuntu1~24.04.2 No subscription required
Medium
CVE-2024-40635
USN-7375-1 -- Org Mode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Org Mode did not correctly handle filenames containing shell metacharacters. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Org Mode could run untrusted code left in its buffer. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-30202) It was discovered that Org Mode did not correctly handle the contents of remote files. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-30205) It was discovered that Org Mode could be made to run arbitrary Elisp code. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7375-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: elpa-org - 9.6.10+dfsg-1ubuntu0.1~esm1 org-mode - 9.6.10+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-28617
CVE-2024-30202
CVE-2024-30205
CVE-2024-39331
USN-7376-2 -- MariaDB vulnerability
Ubuntu 24.04 LTS
USN-7376-1 fixed vulnerabilities in MariaDB. This update provides the corresponding updates for Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. Original advisory details: A security issue was discovered in MariaDB and this update includes a new upstream MariaDB version to fix the issue. In addition to security fixes, the updated packages contain bug and regression fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-7376-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmariadb-dev - 1:10.11.11-0ubuntu0.24.04.2 libmariadb-dev-compat - 1:10.11.11-0ubuntu0.24.04.2 libmariadb3 - 1:10.11.11-0ubuntu0.24.04.2 libmariadbd-dev - 1:10.11.11-0ubuntu0.24.04.2 libmariadbd19t64 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-backup - 1:10.11.11-0ubuntu0.24.04.2 mariadb-client - 1:10.11.11-0ubuntu0.24.04.2 mariadb-client-core - 1:10.11.11-0ubuntu0.24.04.2 mariadb-common - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-connect - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-cracklib-password-check - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-gssapi-client - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-gssapi-server - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-hashicorp-key-management - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-mroonga - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-oqgraph - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-bzip2 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lz4 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lzma - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lzo - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-snappy - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-rocksdb - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-s3 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-spider - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server-10.5 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server-core - 1:10.11.11-0ubuntu0.24.04.2 mariadb-test - 1:10.11.11-0ubuntu0.24.04.2 mariadb-test-data - 1:10.11.11-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2025-21490
USN-7377-1 -- Smarty vulnerability
Ubuntu 24.04 LTS
It was discovered that Smarty did not properly sanitize template file names. An attacker could possibly use this issue to cause Smarty to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7377-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smarty4 - 4.3.1-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-35226
USN-7378-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript incorrectly serialized DollarBlend in certain fonts. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27830) It was discovered that Ghostscript incorrectly handled the DOCXWRITE TXTWRITE device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27831) It was discovered that Ghostscript incorrectly handled the NPDL device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27832) It was discovered that Ghostscript incorrectly handled certain long TTF file names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-27833) It was discovered that Ghostscript incorrectly handled oversized Type 4 functions in certain PDF documents. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27834) It was discovered that Ghostscript incorrectly handled converting certain glyphs to Unicode. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27835) It was discovered that Ghostscript incorrectly handled the BJ10V device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27836) Update Instructions: Run `sudo pro fix USN-7378-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.5 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.5 libgs-common - 10.02.1~dfsg1-0ubuntu7.5 libgs-dev - 10.02.1~dfsg1-0ubuntu7.5 libgs10 - 10.02.1~dfsg1-0ubuntu7.5 libgs10-common - 10.02.1~dfsg1-0ubuntu7.5 No subscription required
Medium
CVE-2025-27830
CVE-2025-27831
CVE-2025-27832
CVE-2025-27833
CVE-2025-27834
CVE-2025-27835
CVE-2025-27836
USN-7379-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-57921, CVE-2024-56614, CVE-2024-56558, CVE-2024-56589, CVE-2024-56662, CVE-2024-56610, CVE-2024-56717, CVE-2024-57890, CVE-2024-55639, CVE-2024-56562, CVE-2025-21633, CVE-2024-56598, CVE-2024-47794, CVE-2024-41935, CVE-2024-57901, CVE-2024-56587, CVE-2024-56581, CVE-2024-56783, CVE-2024-57888, CVE-2024-57809, CVE-2024-57926, CVE-2025-21650, CVE-2024-56634, CVE-2025-21639, CVE-2025-21656, CVE-2024-56578, CVE-2025-21632, CVE-2024-56784, CVE-2025-21644, CVE-2024-56776, CVE-2024-56764, CVE-2024-56652, CVE-2024-56550, CVE-2024-56569, CVE-2024-57904, CVE-2024-49569, CVE-2024-56770, CVE-2024-56606, CVE-2024-57806, CVE-2024-56646, CVE-2024-57895, CVE-2024-57880, CVE-2024-56650, CVE-2024-56591, CVE-2024-56590, CVE-2024-56642, CVE-2024-56713, CVE-2025-21663, CVE-2024-57938, CVE-2024-56760, CVE-2024-56583, CVE-2025-21662, CVE-2024-56629, CVE-2024-47408, CVE-2024-57850, CVE-2024-56777, CVE-2024-56626, CVE-2024-56773, CVE-2024-56647, CVE-2025-21664, CVE-2024-56564, CVE-2024-56597, CVE-2024-56623, CVE-2024-57897, CVE-2024-56670, CVE-2024-56567, CVE-2024-57931, CVE-2024-56761, CVE-2024-57935, CVE-2024-53690, CVE-2025-21640, CVE-2024-56608, CVE-2024-57878, CVE-2025-21648, CVE-2024-57898, CVE-2024-57889, CVE-2024-56644, CVE-2024-56763, CVE-2024-57900, CVE-2024-56575, CVE-2024-56786, CVE-2025-21635, CVE-2024-56559, CVE-2024-56659, CVE-2024-56621, CVE-2024-57908, CVE-2024-52319, CVE-2024-43098, CVE-2024-57838, CVE-2024-56782, CVE-2025-21631, CVE-2024-36476, CVE-2025-21649, CVE-2024-56667, CVE-2024-49571, CVE-2024-55916, CVE-2024-57887, CVE-2024-56640, CVE-2024-57801, CVE-2024-57886, CVE-2024-56582, CVE-2024-56561, CVE-2024-56665, CVE-2024-57805, CVE-2024-51729, CVE-2024-57857, CVE-2024-57876, CVE-2024-57896, CVE-2024-57799, CVE-2024-57925, CVE-2024-57917, CVE-2024-56664, CVE-2024-57913, CVE-2025-21660, CVE-2024-56596, CVE-2024-56671, CVE-2024-56595, CVE-2024-56781, CVE-2024-57912, CVE-2024-56638, CVE-2024-56636, CVE-2024-56669, CVE-2024-57945, CVE-2024-56633, CVE-2024-56605, CVE-2024-57882, CVE-2025-21652, CVE-2024-53179, CVE-2024-56599, CVE-2024-57892, CVE-2025-21647, CVE-2024-57910, CVE-2024-57792, CVE-2024-56768, CVE-2024-56711, CVE-2024-47143, CVE-2024-56577, CVE-2024-56574, CVE-2024-56765, CVE-2024-58087, CVE-2024-53685, CVE-2024-56787, CVE-2024-56592, CVE-2024-56368, CVE-2024-56615, CVE-2024-56712, CVE-2024-56648, CVE-2024-57874, CVE-2024-56653, CVE-2024-56656, CVE-2024-56641, CVE-2024-56719, CVE-2025-21658, CVE-2024-56637, CVE-2024-56709, CVE-2024-57843, CVE-2024-56588, CVE-2024-57807, CVE-2024-57939, CVE-2024-56594, CVE-2024-55642, CVE-2024-57841, CVE-2024-50051, CVE-2024-56663, CVE-2024-56654, CVE-2024-56369, CVE-2024-57885, CVE-2024-56779, CVE-2024-56772, CVE-2024-56617, CVE-2024-56624, CVE-2024-56570, CVE-2024-56639, CVE-2025-21642, CVE-2024-56603, CVE-2024-56604, CVE-2024-57875, CVE-2025-21653, CVE-2025-21654, CVE-2024-56645, CVE-2024-56775, CVE-2024-52332, CVE-2024-48875, CVE-2024-41932, CVE-2024-57804, CVE-2025-21661, CVE-2024-57932, CVE-2024-53681, CVE-2024-56563, CVE-2024-56609, CVE-2024-57798, CVE-2025-21637, CVE-2024-57940, CVE-2024-56675, CVE-2024-56630, CVE-2024-56565, CVE-2024-54460, CVE-2024-56573, CVE-2025-21645, CVE-2024-56715, CVE-2024-56632, CVE-2024-56622, CVE-2024-56673, CVE-2024-48881, CVE-2024-56593, CVE-2024-56620, CVE-2024-48876, CVE-2025-21643, CVE-2024-56657, CVE-2024-57905, CVE-2024-57802, CVE-2024-56766, CVE-2024-57893, CVE-2024-57894, CVE-2024-57903, CVE-2024-57902, CVE-2024-57934, CVE-2024-57881, CVE-2024-56602, CVE-2024-47809, CVE-2024-56580, CVE-2024-57899, CVE-2024-56759, CVE-2024-56586, CVE-2024-57839, CVE-2024-49568, CVE-2024-56660, CVE-2024-53687, CVE-2024-57907, CVE-2024-56601, CVE-2024-56767, CVE-2024-57916, CVE-2024-56616, CVE-2024-56557, CVE-2024-56566, CVE-2024-56643, CVE-2025-21638, CVE-2024-57879, CVE-2025-21655, CVE-2024-56618, CVE-2024-56758, CVE-2024-56576, CVE-2024-57849, CVE-2024-56372, CVE-2024-45828, CVE-2024-57795, CVE-2024-56710, CVE-2024-56568, CVE-2024-56769, CVE-2025-21834, CVE-2024-56716, CVE-2024-56613, CVE-2024-56584, CVE-2024-56552, CVE-2025-21659, CVE-2024-57929, CVE-2024-57946, CVE-2025-21646, CVE-2024-56572, CVE-2024-55881, CVE-2025-21651, CVE-2024-57924, CVE-2025-21634, CVE-2024-53682, CVE-2024-57872, CVE-2024-53680, CVE-2024-54680, CVE-2024-57918, CVE-2024-56780, CVE-2025-21636, CVE-2024-57906, CVE-2024-55641, CVE-2024-54455, CVE-2024-57919, CVE-2024-54683, CVE-2024-54193, CVE-2024-56635, CVE-2024-57933, CVE-2024-56611, CVE-2024-56551, CVE-2024-57883, CVE-2024-57793, CVE-2024-56631, CVE-2024-56600, CVE-2024-56651, CVE-2024-56714, CVE-2024-39282, CVE-2024-56627, CVE-2024-56649, CVE-2024-56579, CVE-2024-57791, CVE-2024-56774, CVE-2024-57944, CVE-2024-57911, CVE-2024-48873, CVE-2024-57884, CVE-2025-21629, CVE-2024-56778, CVE-2024-56619, CVE-2024-54191, CVE-2024-56771, CVE-2024-47141, CVE-2024-56757, CVE-2024-56718, CVE-2024-56655, CVE-2024-56607, CVE-2024-56785, CVE-2024-56625) Update Instructions: Run `sudo pro fix USN-7379-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-buildinfo-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-cloud-tools-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-headers-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-hwe-6.11-headers-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-hwe-6.11-tools-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-unsigned-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-image-unsigned-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-modules-extra-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu6-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-ipu7-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-usbio-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-vision-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-tools-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 No subscription required linux-image-6.11.0-21-generic - 6.11.0-21.21~24.04.1+1 linux-image-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1+1 linux-image-uc-6.11.0-21-generic - 6.11.0-21.21~24.04.1+1 linux-image-uc-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1+1 No subscription required
High
CVE-2024-36476
CVE-2024-39282
CVE-2024-41932
CVE-2024-41935
CVE-2024-43098
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47408
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49568
CVE-2024-49569
CVE-2024-49571
CVE-2024-50051
CVE-2024-51729
CVE-2024-52319
CVE-2024-52332
CVE-2024-53179
CVE-2024-53680
CVE-2024-53681
CVE-2024-53682
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54191
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55641
CVE-2024-55642
CVE-2024-55881
CVE-2024-55916
CVE-2024-56368
CVE-2024-56369
CVE-2024-56372
CVE-2024-56550
CVE-2024-56551
CVE-2024-56552
CVE-2024-56557
CVE-2024-56558
CVE-2024-56559
CVE-2024-56561
CVE-2024-56562
CVE-2024-56563
CVE-2024-56564
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56591
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56617
CVE-2024-56618
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56624
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56639
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56646
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56655
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56669
CVE-2024-56670
CVE-2024-56671
CVE-2024-56673
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56711
CVE-2024-56712
CVE-2024-56713
CVE-2024-56714
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56719
CVE-2024-56757
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56765
CVE-2024-56766
CVE-2024-56767
CVE-2024-56768
CVE-2024-56769
CVE-2024-56770
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56784
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57795
CVE-2024-57798
CVE-2024-57799
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57809
CVE-2024-57838
CVE-2024-57839
CVE-2024-57841
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57857
CVE-2024-57872
CVE-2024-57874
CVE-2024-57875
CVE-2024-57876
CVE-2024-57878
CVE-2024-57879
CVE-2024-57880
CVE-2024-57881
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57886
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57905
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57918
CVE-2024-57919
CVE-2024-57921
CVE-2024-57924
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57934
CVE-2024-57935
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57944
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2025-21629
CVE-2025-21631
CVE-2025-21632
CVE-2025-21633
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21644
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21661
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21834
USN-7381-1 -- Linux kernel (Low Latency) vulnerabilities
Ubuntu 24.04 LTS
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Network namespace; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-56712, CVE-2024-56761, CVE-2025-21661, CVE-2024-56565, CVE-2024-57804, CVE-2024-57887, CVE-2025-21642, CVE-2024-56779, CVE-2025-21656, CVE-2024-57890, CVE-2024-36476, CVE-2024-57843, CVE-2024-56594, CVE-2024-41932, CVE-2025-21653, CVE-2024-56567, CVE-2024-56665, CVE-2024-54191, CVE-2024-57893, CVE-2024-57932, CVE-2024-56656, CVE-2024-57945, CVE-2024-57931, CVE-2024-56599, CVE-2024-57897, CVE-2024-57903, CVE-2024-57918, CVE-2024-57795, CVE-2024-56662, CVE-2025-21639, CVE-2024-55881, CVE-2024-57889, CVE-2024-57884, CVE-2024-57934, CVE-2024-39282, CVE-2024-56718, CVE-2024-56644, CVE-2024-56760, CVE-2024-43098, CVE-2024-47143, CVE-2024-55642, CVE-2024-56634, CVE-2024-56564, CVE-2024-56768, CVE-2024-56649, CVE-2024-57919, CVE-2024-56620, CVE-2024-56625, CVE-2024-56655, CVE-2024-56772, CVE-2025-21637, CVE-2024-56617, CVE-2024-57879, CVE-2024-56715, CVE-2024-56550, CVE-2024-50051, CVE-2024-56673, CVE-2024-51729, CVE-2025-21664, CVE-2025-21649, CVE-2024-56605, CVE-2024-56622, CVE-2024-56591, CVE-2024-56782, CVE-2024-57801, CVE-2024-56664, CVE-2024-57916, CVE-2024-53680, CVE-2024-57926, CVE-2024-56637, CVE-2024-56769, CVE-2024-57924, CVE-2024-56648, CVE-2024-57872, CVE-2024-56593, CVE-2024-57913, CVE-2024-53682, CVE-2024-56670, CVE-2024-56767, CVE-2024-56778, CVE-2024-56777, CVE-2025-21658, CVE-2025-21646, CVE-2024-48875, CVE-2024-56758, CVE-2024-56604, CVE-2024-56787, CVE-2024-56581, CVE-2025-21635, CVE-2024-56641, CVE-2024-56608, CVE-2024-57885, CVE-2024-56716, CVE-2024-56671, CVE-2024-56559, CVE-2025-21633, CVE-2024-56372, CVE-2024-57888, CVE-2024-56623, CVE-2025-21638, CVE-2024-56600, CVE-2024-56647, CVE-2025-21659, CVE-2024-41935, CVE-2024-56624, CVE-2024-56574, CVE-2025-21648, CVE-2024-56621, CVE-2024-54460, CVE-2024-56659, CVE-2024-47141, CVE-2024-57805, CVE-2024-57792, CVE-2024-45828, CVE-2024-53681, CVE-2024-56568, CVE-2024-56764, CVE-2025-21650, CVE-2024-56601, CVE-2024-56663, CVE-2025-21660, CVE-2025-21629, CVE-2024-56595, CVE-2024-57917, CVE-2024-53685, CVE-2024-57882, CVE-2024-57894, CVE-2024-56651, CVE-2024-56657, CVE-2024-57876, CVE-2024-56717, CVE-2024-57935, CVE-2024-56667, CVE-2024-57910, CVE-2024-57793, CVE-2024-56631, CVE-2024-56638, CVE-2025-21640, CVE-2024-56710, CVE-2024-56583, CVE-2024-56557, CVE-2024-56658, CVE-2025-21632, CVE-2024-56645, CVE-2024-56646, CVE-2024-56640, CVE-2024-57944, CVE-2024-56598, CVE-2024-57857, CVE-2024-56709, CVE-2024-56654, CVE-2024-57809, CVE-2024-57895, CVE-2025-21834, CVE-2024-56763, CVE-2024-48881, CVE-2024-57841, CVE-2024-57878, CVE-2024-56774, CVE-2024-57791, CVE-2024-56575, CVE-2024-56619, CVE-2024-56570, CVE-2024-56616, CVE-2024-56569, CVE-2025-21636, CVE-2024-56572, CVE-2024-56552, CVE-2024-56596, CVE-2025-21654, CVE-2024-56573, CVE-2024-56784, CVE-2024-56626, CVE-2024-56642, CVE-2024-56643, CVE-2024-56719, CVE-2024-56632, CVE-2024-57839, CVE-2024-56578, CVE-2024-53690, CVE-2024-56609, CVE-2024-56562, CVE-2024-56589, CVE-2024-56781, CVE-2024-56672, CVE-2024-56775, CVE-2024-56713, CVE-2024-56580, CVE-2024-57874, CVE-2024-56369, CVE-2024-56711, CVE-2025-21651, CVE-2024-56584, CVE-2024-57904, CVE-2024-54680, CVE-2024-56577, CVE-2024-56558, CVE-2024-56780, CVE-2024-58087, CVE-2024-57892, CVE-2025-21644, CVE-2024-57911, CVE-2024-56579, CVE-2025-21663, CVE-2024-56618, CVE-2024-56766, CVE-2024-56653, CVE-2025-21655, CVE-2024-56669, CVE-2024-56759, CVE-2024-48876, CVE-2025-21631, CVE-2024-56765, CVE-2024-56770, CVE-2024-57838, CVE-2025-21634, CVE-2024-56650, CVE-2024-57939, CVE-2024-56606, CVE-2024-56610, CVE-2025-21662, CVE-2024-56785, CVE-2024-55916, CVE-2025-21643, CVE-2024-56586, CVE-2024-56582, CVE-2024-56614, CVE-2024-49571, CVE-2024-49569, CVE-2024-57798, CVE-2024-56633, CVE-2024-55641, CVE-2025-21647, CVE-2025-21652, CVE-2024-56757, CVE-2024-56597, CVE-2024-47794, CVE-2024-57902, CVE-2024-57925, CVE-2024-54683, CVE-2024-57938, CVE-2024-56615, CVE-2024-57906, CVE-2024-53687, CVE-2024-57899, CVE-2024-56783, CVE-2024-56786, CVE-2024-56635, CVE-2024-56551, CVE-2024-53179, CVE-2024-56588, CVE-2024-47408, CVE-2024-57849, CVE-2024-52319, CVE-2024-56576, CVE-2024-57905, CVE-2024-57946, CVE-2024-56607, CVE-2024-57806, CVE-2024-57933, CVE-2024-55639, CVE-2024-56561, CVE-2024-48873, CVE-2024-52332, CVE-2025-21645, CVE-2024-56602, CVE-2024-56590, CVE-2024-57799, CVE-2024-57929, CVE-2024-56639, CVE-2024-56613, CVE-2024-56675, CVE-2024-57912, CVE-2024-57883, CVE-2024-56636, CVE-2024-56592, CVE-2024-57802, CVE-2024-54455, CVE-2024-57908, CVE-2024-56603, CVE-2024-57875, CVE-2024-56773, CVE-2024-47809, CVE-2024-56630, CVE-2024-56587, CVE-2024-56627, CVE-2024-57921, CVE-2024-56660, CVE-2024-56771, CVE-2024-57886, CVE-2024-57896, CVE-2024-57807, CVE-2024-57907, CVE-2024-49568, CVE-2024-54193, CVE-2024-56652, CVE-2024-57940, CVE-2024-57898, CVE-2024-57901, CVE-2024-56714, CVE-2024-56566, CVE-2024-56563, CVE-2024-56368, CVE-2024-56611, CVE-2024-56776, CVE-2024-57850, CVE-2024-56629, CVE-2024-57881, CVE-2024-57880, CVE-2024-57900) Update Instructions: Run `sudo pro fix USN-7381-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-buildinfo-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-cloud-tools-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-headers-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-headers-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-image-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-unsigned-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-image-unsigned-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-modules-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-modules-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-tools-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-tools-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 No subscription required
High
CVE-2024-36476
CVE-2024-39282
CVE-2024-41932
CVE-2024-41935
CVE-2024-43098
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47408
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49568
CVE-2024-49569
CVE-2024-49571
CVE-2024-50051
CVE-2024-51729
CVE-2024-52319
CVE-2024-52332
CVE-2024-53179
CVE-2024-53680
CVE-2024-53681
CVE-2024-53682
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54191
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55641
CVE-2024-55642
CVE-2024-55881
CVE-2024-55916
CVE-2024-56368
CVE-2024-56369
CVE-2024-56372
CVE-2024-56550
CVE-2024-56551
CVE-2024-56552
CVE-2024-56557
CVE-2024-56558
CVE-2024-56559
CVE-2024-56561
CVE-2024-56562
CVE-2024-56563
CVE-2024-56564
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56591
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56617
CVE-2024-56618
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56624
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56639
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56646
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56655
CVE-2024-56656
CVE-2024-56657
CVE-2024-56658
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56669
CVE-2024-56670
CVE-2024-56671
CVE-2024-56672
CVE-2024-56673
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56711
CVE-2024-56712
CVE-2024-56713
CVE-2024-56714
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56719
CVE-2024-56757
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56765
CVE-2024-56766
CVE-2024-56767
CVE-2024-56768
CVE-2024-56769
CVE-2024-56770
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56784
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57795
CVE-2024-57798
CVE-2024-57799
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57809
CVE-2024-57838
CVE-2024-57839
CVE-2024-57841
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57857
CVE-2024-57872
CVE-2024-57874
CVE-2024-57875
CVE-2024-57876
CVE-2024-57878
CVE-2024-57879
CVE-2024-57880
CVE-2024-57881
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57886
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57905
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57918
CVE-2024-57919
CVE-2024-57921
CVE-2024-57924
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57934
CVE-2024-57935
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57944
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2025-0927
CVE-2025-21629
CVE-2025-21631
CVE-2025-21632
CVE-2025-21633
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21644
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21661
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21834
USN-7382-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-47794, CVE-2025-21653, CVE-2024-55642, CVE-2024-56580, CVE-2024-36476, CVE-2024-56623, CVE-2024-56773, CVE-2024-48873, CVE-2024-47141, CVE-2024-57910, CVE-2024-56759, CVE-2024-54460, CVE-2024-57839, CVE-2024-56625, CVE-2024-55916, CVE-2025-21664, CVE-2025-21652, CVE-2024-56624, CVE-2024-56574, CVE-2024-50051, CVE-2025-21655, CVE-2024-56578, CVE-2024-56782, CVE-2024-57939, CVE-2024-57935, CVE-2024-56647, CVE-2024-57905, CVE-2024-57921, CVE-2024-56660, CVE-2025-21650, CVE-2025-21631, CVE-2024-56642, CVE-2024-56552, CVE-2024-57934, CVE-2024-56621, CVE-2024-57881, CVE-2024-41932, CVE-2024-56770, CVE-2024-57897, CVE-2024-56785, CVE-2024-56664, CVE-2024-57945, CVE-2024-57938, CVE-2024-56636, CVE-2024-56572, CVE-2024-43098, CVE-2024-56760, CVE-2024-57916, CVE-2024-56714, CVE-2025-21660, CVE-2024-57906, CVE-2025-21638, CVE-2024-53687, CVE-2024-56652, CVE-2024-51729, CVE-2024-49571, CVE-2024-57883, CVE-2024-54191, CVE-2024-56712, CVE-2024-49568, CVE-2024-57932, CVE-2024-57893, CVE-2024-56645, CVE-2024-56719, CVE-2024-56641, CVE-2024-57802, CVE-2024-56775, CVE-2024-56627, CVE-2024-56638, CVE-2024-57929, CVE-2024-56615, CVE-2024-56566, CVE-2024-56620, CVE-2024-56577, CVE-2025-21656, CVE-2024-57887, CVE-2024-52319, CVE-2024-56657, CVE-2024-57872, CVE-2024-56607, CVE-2024-56562, CVE-2025-21645, CVE-2025-21634, CVE-2024-56567, CVE-2024-56637, CVE-2025-21646, CVE-2024-57918, CVE-2024-56646, CVE-2024-57849, CVE-2025-21633, CVE-2025-21639, CVE-2024-56644, CVE-2024-56618, CVE-2024-56564, CVE-2024-56369, CVE-2024-56766, CVE-2024-56635, CVE-2024-57907, CVE-2024-56778, CVE-2024-57880, CVE-2024-57885, CVE-2024-56591, CVE-2024-56780, CVE-2024-57913, CVE-2024-54680, CVE-2025-21632, CVE-2024-54683, CVE-2025-21654, CVE-2024-58087, CVE-2024-56772, CVE-2024-56758, CVE-2024-57795, CVE-2025-21644, CVE-2024-56586, CVE-2024-56663, CVE-2024-56558, CVE-2024-57882, CVE-2024-56651, CVE-2024-56783, CVE-2024-53681, CVE-2024-57911, CVE-2024-57879, CVE-2024-56649, CVE-2024-56563, CVE-2024-56639, CVE-2024-56605, CVE-2024-57888, CVE-2024-56640, CVE-2024-57841, CVE-2024-56656, CVE-2024-48875, CVE-2024-48876, CVE-2024-57919, CVE-2024-57940, CVE-2024-56630, CVE-2024-53685, CVE-2024-56604, CVE-2024-47809, CVE-2024-57889, CVE-2024-56619, CVE-2024-57806, CVE-2024-56583, CVE-2024-56715, CVE-2025-21640, CVE-2025-21662, CVE-2024-56662, CVE-2024-55639, CVE-2024-56711, CVE-2024-56372, CVE-2024-54455, CVE-2024-56771, CVE-2024-56368, CVE-2024-57892, CVE-2024-57843, CVE-2025-21636, CVE-2024-56650, CVE-2024-56613, CVE-2024-56716, CVE-2024-57793, CVE-2024-56634, CVE-2024-56595, CVE-2024-57878, CVE-2024-56598, CVE-2024-39282, CVE-2024-57908, CVE-2024-57917, CVE-2024-56763, CVE-2024-56629, CVE-2024-56710, CVE-2024-56671, CVE-2024-56667, CVE-2024-57924, CVE-2024-57926, CVE-2025-21658, CVE-2024-56594, CVE-2024-56584, CVE-2024-53179, CVE-2024-56587, CVE-2024-57946, CVE-2024-56717, CVE-2025-21635, CVE-2024-56779, CVE-2024-57944, CVE-2024-56767, CVE-2024-56781, CVE-2024-56765, CVE-2024-56609, CVE-2024-54193, CVE-2024-57804, CVE-2024-56599, CVE-2024-56602, CVE-2024-57901, CVE-2024-53680, CVE-2024-57801, CVE-2024-57912, CVE-2024-56606, CVE-2024-56579, CVE-2024-56588, CVE-2024-57895, CVE-2024-56601, CVE-2024-55641, CVE-2024-56559, CVE-2024-56557, CVE-2025-21661, CVE-2024-57799, CVE-2024-57850, CVE-2024-57876, CVE-2024-47408, CVE-2024-57899, CVE-2024-56597, CVE-2024-57890, CVE-2024-56670, CVE-2024-56603, CVE-2024-56654, CVE-2025-21834, CVE-2024-56590, CVE-2024-49569, CVE-2024-56616, CVE-2024-56659, CVE-2024-56596, CVE-2025-21642, CVE-2025-21663, CVE-2025-21648, CVE-2024-56614, CVE-2024-56673, CVE-2024-56787, CVE-2024-56713, CVE-2024-56573, CVE-2024-56589, CVE-2024-56764, CVE-2024-56655, CVE-2024-56617, CVE-2024-56669, CVE-2024-56576, CVE-2024-57792, CVE-2024-57904, CVE-2024-52332, CVE-2024-57900, CVE-2024-57933, CVE-2024-55881, CVE-2024-56626, CVE-2024-57894, CVE-2024-56582, CVE-2024-57838, CVE-2025-21629, CVE-2025-21659, CVE-2024-57809, CVE-2024-47143, CVE-2024-57925, CVE-2024-41935, CVE-2025-21649, CVE-2024-57884, CVE-2024-57875, CVE-2025-21647, CVE-2024-56581, CVE-2024-57886, CVE-2024-57896, CVE-2025-21651, CVE-2024-56611, CVE-2024-56575, CVE-2024-57807, CVE-2024-56561, CVE-2024-53690, CVE-2024-56761, CVE-2024-57902, CVE-2024-56600, CVE-2024-56593, CVE-2024-57805, CVE-2024-56568, CVE-2024-56632, CVE-2024-56622, CVE-2025-21637, CVE-2024-45828, CVE-2024-56709, CVE-2024-56631, CVE-2025-21643, CVE-2024-56786, CVE-2024-56565, CVE-2024-57903, CVE-2024-56592, CVE-2024-56569, CVE-2024-56718, CVE-2024-57791, CVE-2024-56665, CVE-2024-56774, CVE-2024-56608, CVE-2024-56643, CVE-2024-57931, CVE-2024-57857, CVE-2024-56777, CVE-2024-53682, CVE-2024-56648, CVE-2024-56769, CVE-2024-48881, CVE-2024-56776, CVE-2024-57798, CVE-2024-57874, CVE-2024-56633, CVE-2024-56768, CVE-2024-56653, CVE-2024-56784, CVE-2024-56550, CVE-2024-56610, CVE-2024-56570, CVE-2024-56675, CVE-2024-57898, CVE-2024-56551) Update Instructions: Run `sudo pro fix USN-7382-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1017-oem - 6.11.0-1017.17 linux-headers-6.11.0-1017-oem - 6.11.0-1017.17 linux-headers-oem-24.04b - 6.11.0-1017.17 linux-image-6.11.0-1017-oem - 6.11.0-1017.17 linux-image-oem-24.04b - 6.11.0-1017.17 linux-image-uc-6.11.0-1017-oem - 6.11.0-1017.17 linux-image-uc-oem-24.04b - 6.11.0-1017.17 linux-image-unsigned-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu6-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu6-oem-24.04b - 6.11.0-1017.17 linux-modules-ipu7-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu7-oem-24.04b - 6.11.0-1017.17 linux-modules-iwlwifi-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1017.17 linux-modules-usbio-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-usbio-oem-24.04b - 6.11.0-1017.17 linux-modules-vision-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-vision-oem-24.04b - 6.11.0-1017.17 linux-oem-24.04b - 6.11.0-1017.17 linux-oem-6.11-headers-6.11.0-1017 - 6.11.0-1017.17 linux-oem-6.11-tools-6.11.0-1017 - 6.11.0-1017.17 linux-tools-6.11.0-1017-oem - 6.11.0-1017.17 linux-tools-oem-24.04b - 6.11.0-1017.17 No subscription required
High
CVE-2024-36476
CVE-2024-39282
CVE-2024-41932
CVE-2024-41935
CVE-2024-43098
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47408
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49568
CVE-2024-49569
CVE-2024-49571
CVE-2024-50051
CVE-2024-51729
CVE-2024-52319
CVE-2024-52332
CVE-2024-53179
CVE-2024-53680
CVE-2024-53681
CVE-2024-53682
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54191
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55641
CVE-2024-55642
CVE-2024-55881
CVE-2024-55916
CVE-2024-56368
CVE-2024-56369
CVE-2024-56372
CVE-2024-56550
CVE-2024-56551
CVE-2024-56552
CVE-2024-56557
CVE-2024-56558
CVE-2024-56559
CVE-2024-56561
CVE-2024-56562
CVE-2024-56563
CVE-2024-56564
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56591
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56617
CVE-2024-56618
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56624
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56639
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56646
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56655
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56669
CVE-2024-56670
CVE-2024-56671
CVE-2024-56673
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56711
CVE-2024-56712
CVE-2024-56713
CVE-2024-56714
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56719
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56765
CVE-2024-56766
CVE-2024-56767
CVE-2024-56768
CVE-2024-56769
CVE-2024-56770
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56784
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57795
CVE-2024-57798
CVE-2024-57799
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57809
CVE-2024-57838
CVE-2024-57839
CVE-2024-57841
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57857
CVE-2024-57872
CVE-2024-57874
CVE-2024-57875
CVE-2024-57876
CVE-2024-57878
CVE-2024-57879
CVE-2024-57880
CVE-2024-57881
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57886
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57905
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57918
CVE-2024-57919
CVE-2024-57921
CVE-2024-57924
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57934
CVE-2024-57935
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57944
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2025-21629
CVE-2025-21631
CVE-2025-21632
CVE-2025-21633
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21644
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21661
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21834
USN-7383-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Drivers core; - Ublk userspace block driver; - Compressed RAM block device driver; - CPU frequency scaling framework; - DAX dirext access to differentiated memory framework; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - Pin controllers subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - Framebuffer layer; - BTRFS file system; - Ext4 file system; - F2FS file system; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Network traffic control; - Network sockets; - User-space API (UAPI); - io_uring subsystem; - Kernel thread helper (kthread); - RCU subsystem; - Timer subsystem; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - Multipath TCP; - Netfilter; - Netlink; - Unix domain sockets; - Wireless networking; - eXpress Data Path; (CVE-2024-50182, CVE-2024-50020, CVE-2024-50060, CVE-2024-50074, CVE-2024-50193, CVE-2024-50117, CVE-2024-50201, CVE-2024-50033, CVE-2024-50056, CVE-2024-50026, CVE-2024-50059, CVE-2024-50041, CVE-2024-50083, CVE-2024-50038, CVE-2024-50229, CVE-2024-50028, CVE-2024-50183, CVE-2024-50196, CVE-2024-50029, CVE-2024-50093, CVE-2024-50188, CVE-2024-50025, CVE-2024-50200, CVE-2024-50068, CVE-2024-49920, CVE-2024-50198, CVE-2024-50035, CVE-2024-50042, CVE-2024-50023, CVE-2024-50047, CVE-2024-56582, CVE-2024-50090, CVE-2024-50062, CVE-2024-50073, CVE-2024-50063, CVE-2024-50098, CVE-2024-50197, CVE-2024-50040, CVE-2024-50180, CVE-2024-53170, CVE-2024-50087, CVE-2024-50031, CVE-2024-50202, CVE-2024-50058, CVE-2024-50186, CVE-2024-50134, CVE-2024-50194, CVE-2024-50075, CVE-2024-50046, CVE-2024-50078, CVE-2024-50066, CVE-2024-53156, CVE-2024-49893, CVE-2024-50021, CVE-2024-47711, CVE-2024-47726, CVE-2024-50024, CVE-2024-49865, CVE-2024-50064, CVE-2024-50049, CVE-2024-50171, CVE-2024-50019, CVE-2024-50077, CVE-2024-50199, CVE-2024-50072, CVE-2024-50069, CVE-2024-50048, CVE-2024-49972, CVE-2024-53165, CVE-2024-50022, CVE-2024-50084, CVE-2024-50185, CVE-2024-50055, CVE-2024-50187, CVE-2024-50009, CVE-2024-50082, CVE-2024-50085, CVE-2024-50095, CVE-2024-50195, CVE-2024-50080, CVE-2024-50076, CVE-2024-50088, CVE-2024-50039, CVE-2024-50044, CVE-2024-50030, CVE-2024-49968, CVE-2024-50148, CVE-2024-50192, CVE-2024-50032, CVE-2024-50061, CVE-2024-50233, CVE-2024-50099, CVE-2024-49921, CVE-2024-50184, CVE-2024-50065, CVE-2024-49914, CVE-2024-50027, CVE-2024-50070, CVE-2024-50086, CVE-2024-50189, CVE-2024-56614, CVE-2024-50057, CVE-2024-50096, CVE-2024-50045, CVE-2024-50036, CVE-2024-56663, CVE-2024-50191, CVE-2024-50101) Update Instructions: Run `sudo pro fix USN-7383-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-cloud-tools-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-cloud-tools-gkeop - 6.8.0-1008.10 linux-cloud-tools-gkeop-6.8 - 6.8.0-1008.10 linux-gkeop - 6.8.0-1008.10 linux-gkeop-6.8 - 6.8.0-1008.10 linux-gkeop-cloud-tools-6.8.0-1008 - 6.8.0-1008.10 linux-gkeop-headers-6.8.0-1008 - 6.8.0-1008.10 linux-gkeop-tools-6.8.0-1008 - 6.8.0-1008.10 linux-headers-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-headers-gkeop - 6.8.0-1008.10 linux-headers-gkeop-6.8 - 6.8.0-1008.10 linux-image-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-image-gkeop - 6.8.0-1008.10 linux-image-gkeop-6.8 - 6.8.0-1008.10 linux-image-unsigned-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-extra-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-extra-gkeop - 6.8.0-1008.10 linux-modules-extra-gkeop-6.8 - 6.8.0-1008.10 linux-tools-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-tools-gkeop - 6.8.0-1008.10 linux-tools-gkeop-6.8 - 6.8.0-1008.10 No subscription required linux-buildinfo-6.8.0-1021-gke - 6.8.0-1021.25 linux-gke - 6.8.0-1021.25 linux-gke-headers-6.8.0-1021 - 6.8.0-1021.25 linux-gke-tools-6.8.0-1021 - 6.8.0-1021.25 linux-headers-6.8.0-1021-gke - 6.8.0-1021.25 linux-headers-gke - 6.8.0-1021.25 linux-image-6.8.0-1021-gke - 6.8.0-1021.25 linux-image-gke - 6.8.0-1021.25 linux-image-unsigned-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-extra-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-iwlwifi-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-iwlwifi-gke - 6.8.0-1021.25 linux-tools-6.8.0-1021-gke - 6.8.0-1021.25 linux-tools-gke - 6.8.0-1021.25 No subscription required linux-buildinfo-6.8.0-1022-oracle - 6.8.0-1022.23 linux-buildinfo-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-headers-6.8.0-1022-oracle - 6.8.0-1022.23 linux-headers-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-headers-oracle - 6.8.0-1022.23 linux-headers-oracle-64k - 6.8.0-1022.23 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-headers-oracle-lts-24.04 - 6.8.0-1022.23 linux-image-6.8.0-1022-oracle - 6.8.0-1022.23 linux-image-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-image-oracle - 6.8.0-1022.23 linux-image-oracle-64k - 6.8.0-1022.23 linux-image-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-image-oracle-lts-24.04 - 6.8.0-1022.23 linux-image-unsigned-6.8.0-1022-oracle - 6.8.0-1022.23 linux-image-unsigned-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-modules-6.8.0-1022-oracle - 6.8.0-1022.23 linux-modules-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-modules-extra-6.8.0-1022-oracle - 6.8.0-1022.23 linux-modules-extra-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-oracle - 6.8.0-1022.23 linux-oracle-64k - 6.8.0-1022.23 linux-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-oracle-headers-6.8.0-1022 - 6.8.0-1022.23 linux-oracle-lts-24.04 - 6.8.0-1022.23 linux-oracle-tools-6.8.0-1022 - 6.8.0-1022.23 linux-tools-6.8.0-1022-oracle - 6.8.0-1022.23 linux-tools-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-tools-oracle - 6.8.0-1022.23 linux-tools-oracle-64k - 6.8.0-1022.23 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-tools-oracle-lts-24.04 - 6.8.0-1022.23 No subscription required linux-buildinfo-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-buildinfo-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-cloud-tools-nvidia - 6.8.0-1024.27 linux-headers-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-headers-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-headers-nvidia - 6.8.0-1024.27 linux-headers-nvidia-64k - 6.8.0-1024.27 linux-image-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-image-nvidia - 6.8.0-1024.27 linux-image-nvidia-64k - 6.8.0-1024.27 linux-image-uc-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-uc-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-image-unsigned-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-unsigned-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-extra-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-nvidia-fs-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1024.27 linux-nvidia - 6.8.0-1024.27 linux-nvidia-64k - 6.8.0-1024.27 linux-nvidia-headers-6.8.0-1024 - 6.8.0-1024.27 linux-nvidia-tools-6.8.0-1024 - 6.8.0-1024.27 linux-tools-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-tools-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-tools-nvidia - 6.8.0-1024.27 linux-tools-nvidia-64k - 6.8.0-1024.27 No subscription required linux-buildinfo-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-buildinfo-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-headers-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-uc-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-uc-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-unsigned-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-unsigned-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-extra-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-nvidia-lowlatency - 6.8.0-1024.27.1 linux-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-nvidia-lowlatency-headers-6.8.0-1024 - 6.8.0-1024.27.1 linux-nvidia-lowlatency-tools-6.8.0-1024 - 6.8.0-1024.27.1 linux-tools-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-tools-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-tools-nvidia-lowlatency - 6.8.0-1024.27.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1024.27.1 No subscription required linux-aws - 6.8.0-1025.27 linux-aws-cloud-tools-6.8.0-1025 - 6.8.0-1025.27 linux-aws-headers-6.8.0-1025 - 6.8.0-1025.27 linux-aws-lts-24.04 - 6.8.0-1025.27 linux-aws-tools-6.8.0-1025 - 6.8.0-1025.27 linux-buildinfo-6.8.0-1025-aws - 6.8.0-1025.27 linux-cloud-tools-6.8.0-1025-aws - 6.8.0-1025.27 linux-headers-6.8.0-1025-aws - 6.8.0-1025.27 linux-headers-aws - 6.8.0-1025.27 linux-headers-aws-lts-24.04 - 6.8.0-1025.27 linux-image-6.8.0-1025-aws - 6.8.0-1025.27 linux-image-aws - 6.8.0-1025.27 linux-image-aws-lts-24.04 - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-extra-aws - 6.8.0-1025.27 linux-modules-extra-aws-lts-24.04 - 6.8.0-1025.27 linux-tools-6.8.0-1025-aws - 6.8.0-1025.27 linux-tools-aws - 6.8.0-1025.27 linux-tools-aws-lts-24.04 - 6.8.0-1025.27 No subscription required linux-buildinfo-6.8.0-1026-gcp - 6.8.0-1026.28 linux-buildinfo-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-gcp - 6.8.0-1026.28 linux-gcp-64k - 6.8.0-1026.28 linux-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-gcp-headers-6.8.0-1026 - 6.8.0-1026.28 linux-gcp-lts-24.04 - 6.8.0-1026.28 linux-gcp-tools-6.8.0-1026 - 6.8.0-1026.28 linux-headers-6.8.0-1026-gcp - 6.8.0-1026.28 linux-headers-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-headers-gcp - 6.8.0-1026.28 linux-headers-gcp-64k - 6.8.0-1026.28 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-headers-gcp-lts-24.04 - 6.8.0-1026.28 linux-image-6.8.0-1026-gcp - 6.8.0-1026.28 linux-image-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-image-gcp - 6.8.0-1026.28 linux-image-gcp-64k - 6.8.0-1026.28 linux-image-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-image-gcp-lts-24.04 - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-gcp - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-6.8.0-1026-gcp - 6.8.0-1026.28 linux-modules-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-gcp - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-extra-gcp - 6.8.0-1026.28 linux-modules-extra-gcp-64k - 6.8.0-1026.28 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1026.28 linux-tools-6.8.0-1026-gcp - 6.8.0-1026.28 linux-tools-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-tools-gcp - 6.8.0-1026.28 linux-tools-gcp-64k - 6.8.0-1026.28 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-tools-gcp-lts-24.04 - 6.8.0-1026.28 No subscription required linux-bpf-dev - 6.8.0-56.58 linux-buildinfo-6.8.0-56-generic - 6.8.0-56.58 linux-buildinfo-6.8.0-56-generic-64k - 6.8.0-56.58 linux-cloud-tools-6.8.0-56 - 6.8.0-56.58 linux-cloud-tools-6.8.0-56-generic - 6.8.0-56.58 linux-cloud-tools-common - 6.8.0-56.58 linux-cloud-tools-generic - 6.8.0-56.58 linux-cloud-tools-virtual - 6.8.0-56.58 linux-crashdump - 6.8.0-56.58 linux-doc - 6.8.0-56.58 linux-generic - 6.8.0-56.58 linux-generic-64k - 6.8.0-56.58 linux-generic-lpae - 6.8.0-56.58 linux-headers-6.8.0-56 - 6.8.0-56.58 linux-headers-6.8.0-56-generic - 6.8.0-56.58 linux-headers-6.8.0-56-generic-64k - 6.8.0-56.58 linux-headers-generic - 6.8.0-56.58 linux-headers-generic-64k - 6.8.0-56.58 linux-headers-generic-lpae - 6.8.0-56.58 linux-headers-kvm - 6.8.0-56.58 linux-headers-laptop-23.10 - 6.8.0-56.58 linux-headers-oem-20.04 - 6.8.0-56.58 linux-headers-oem-20.04b - 6.8.0-56.58 linux-headers-oem-20.04c - 6.8.0-56.58 linux-headers-oem-20.04d - 6.8.0-56.58 linux-headers-oem-22.04 - 6.8.0-56.58 linux-headers-virtual - 6.8.0-56.58 linux-image-extra-virtual - 6.8.0-56.58 linux-image-generic - 6.8.0-56.58 linux-image-generic-64k - 6.8.0-56.58 linux-image-generic-lpae - 6.8.0-56.58 linux-image-kvm - 6.8.0-56.58 linux-image-laptop-23.10 - 6.8.0-56.58 linux-image-oem-20.04 - 6.8.0-56.58 linux-image-oem-20.04b - 6.8.0-56.58 linux-image-oem-20.04c - 6.8.0-56.58 linux-image-oem-20.04d - 6.8.0-56.58 linux-image-oem-22.04 - 6.8.0-56.58 linux-image-uc-generic - 6.8.0-56.58 linux-image-unsigned-6.8.0-56-generic - 6.8.0-56.58 linux-image-unsigned-6.8.0-56-generic-64k - 6.8.0-56.58 linux-image-virtual - 6.8.0-56.58 linux-kvm - 6.8.0-56.58 linux-laptop-23.10 - 6.8.0-56.58 linux-lib-rust-6.8.0-56-generic - 6.8.0-56.58 linux-libc-dev - 6.8.0-56.58 linux-modules-6.8.0-56-generic - 6.8.0-56.58 linux-modules-6.8.0-56-generic-64k - 6.8.0-56.58 linux-modules-extra-6.8.0-56-generic - 6.8.0-56.58 linux-modules-ipu6-6.8.0-56-generic - 6.8.0-56.58 linux-modules-ipu6-generic - 6.8.0-56.58 linux-modules-iwlwifi-6.8.0-56-generic - 6.8.0-56.58 linux-modules-iwlwifi-generic - 6.8.0-56.58 linux-modules-iwlwifi-oem-20.04 - 6.8.0-56.58 linux-modules-iwlwifi-oem-20.04d - 6.8.0-56.58 linux-modules-iwlwifi-oem-22.04 - 6.8.0-56.58 linux-modules-usbio-6.8.0-56-generic - 6.8.0-56.58 linux-modules-usbio-generic - 6.8.0-56.58 linux-oem-20.04 - 6.8.0-56.58 linux-oem-20.04b - 6.8.0-56.58 linux-oem-20.04c - 6.8.0-56.58 linux-oem-20.04d - 6.8.0-56.58 linux-oem-22.04 - 6.8.0-56.58 linux-source - 6.8.0-56.58 linux-source-6.8.0 - 6.8.0-56.58 linux-tools-6.8.0-56 - 6.8.0-56.58 linux-tools-6.8.0-56-generic - 6.8.0-56.58 linux-tools-6.8.0-56-generic-64k - 6.8.0-56.58 linux-tools-common - 6.8.0-56.58 linux-tools-generic - 6.8.0-56.58 linux-tools-generic-64k - 6.8.0-56.58 linux-tools-generic-lpae - 6.8.0-56.58 linux-tools-host - 6.8.0-56.58 linux-tools-kvm - 6.8.0-56.58 linux-tools-laptop-23.10 - 6.8.0-56.58 linux-tools-oem-20.04 - 6.8.0-56.58 linux-tools-oem-20.04b - 6.8.0-56.58 linux-tools-oem-20.04c - 6.8.0-56.58 linux-tools-oem-20.04d - 6.8.0-56.58 linux-tools-oem-22.04 - 6.8.0-56.58 linux-tools-virtual - 6.8.0-56.58 linux-virtual - 6.8.0-56.58 No subscription required linux-image-6.8.0-56-generic - 6.8.0-56.58+1 linux-image-6.8.0-56-generic-64k - 6.8.0-56.58+1 linux-image-uc-6.8.0-56-generic - 6.8.0-56.58+1 linux-image-uc-6.8.0-56-generic-64k - 6.8.0-56.58+1 No subscription required linux-buildinfo-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-buildinfo-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-cloud-tools-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-cloud-tools-lowlatency - 6.8.0-56.58.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-headers-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-headers-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-headers-lowlatency - 6.8.0-56.58.1 linux-headers-lowlatency-64k - 6.8.0-56.58.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-image-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-image-lowlatency - 6.8.0-56.58.1 linux-image-lowlatency-64k - 6.8.0-56.58.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-unsigned-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-image-unsigned-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-lowlatency - 6.8.0-56.58.1 linux-lowlatency-64k - 6.8.0-56.58.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-lowlatency-cloud-tools-6.8.0-56 - 6.8.0-56.58.1 linux-lowlatency-headers-6.8.0-56 - 6.8.0-56.58.1 linux-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-lowlatency-lib-rust-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-lowlatency-tools-6.8.0-56 - 6.8.0-56.58.1 linux-modules-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-modules-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-modules-iwlwifi-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-modules-iwlwifi-lowlatency - 6.8.0-56.58.1 linux-tools-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-tools-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-tools-lowlatency - 6.8.0-56.58.1 linux-tools-lowlatency-64k - 6.8.0-56.58.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 No subscription required
High
CVE-2024-47711
CVE-2024-47726
CVE-2024-49865
CVE-2024-49893
CVE-2024-49914
CVE-2024-49920
CVE-2024-49921
CVE-2024-49968
CVE-2024-49972
CVE-2024-50009
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50032
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50117
CVE-2024-50134
CVE-2024-50148
CVE-2024-50171
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50229
CVE-2024-50233
CVE-2024-53156
CVE-2024-53165
CVE-2024-53170
CVE-2024-56582
CVE-2024-56614
CVE-2024-56663
USN-7383-2 -- Linux kernel (Real-time) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Drivers core; - Ublk userspace block driver; - Compressed RAM block device driver; - CPU frequency scaling framework; - DAX dirext access to differentiated memory framework; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - Pin controllers subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - Framebuffer layer; - BTRFS file system; - Ext4 file system; - F2FS file system; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Network traffic control; - Network sockets; - User-space API (UAPI); - io_uring subsystem; - Kernel thread helper (kthread); - RCU subsystem; - Timer subsystem; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - Multipath TCP; - Netfilter; - Netlink; - Unix domain sockets; - Wireless networking; - eXpress Data Path; (CVE-2024-50182, CVE-2024-50020, CVE-2024-50060, CVE-2024-50074, CVE-2024-50193, CVE-2024-50117, CVE-2024-50201, CVE-2024-50033, CVE-2024-50056, CVE-2024-50026, CVE-2024-50059, CVE-2024-50041, CVE-2024-50083, CVE-2024-50038, CVE-2024-50229, CVE-2024-50028, CVE-2024-50183, CVE-2024-50196, CVE-2024-50029, CVE-2024-50093, CVE-2024-50188, CVE-2024-50025, CVE-2024-50200, CVE-2024-50068, CVE-2024-49920, CVE-2024-50198, CVE-2024-50035, CVE-2024-50042, CVE-2024-50023, CVE-2024-50047, CVE-2024-56582, CVE-2024-50090, CVE-2024-50062, CVE-2024-50073, CVE-2024-50063, CVE-2024-50098, CVE-2024-50197, CVE-2024-50040, CVE-2024-50180, CVE-2024-53170, CVE-2024-50087, CVE-2024-50031, CVE-2024-50202, CVE-2024-50058, CVE-2024-50186, CVE-2024-50134, CVE-2024-50194, CVE-2024-50075, CVE-2024-50046, CVE-2024-50078, CVE-2024-50066, CVE-2024-53156, CVE-2024-49893, CVE-2024-50021, CVE-2024-47711, CVE-2024-47726, CVE-2024-50024, CVE-2024-49865, CVE-2024-50064, CVE-2024-50049, CVE-2024-50171, CVE-2024-50019, CVE-2024-50077, CVE-2024-50199, CVE-2024-50072, CVE-2024-50069, CVE-2024-50048, CVE-2024-49972, CVE-2024-53165, CVE-2024-50022, CVE-2024-50084, CVE-2024-50185, CVE-2024-50055, CVE-2024-50187, CVE-2024-50009, CVE-2024-50082, CVE-2024-50085, CVE-2024-50095, CVE-2024-50195, CVE-2024-50080, CVE-2024-50076, CVE-2024-50088, CVE-2024-50039, CVE-2024-50044, CVE-2024-50030, CVE-2024-49968, CVE-2024-50148, CVE-2024-50192, CVE-2024-50032, CVE-2024-50061, CVE-2024-50233, CVE-2024-50099, CVE-2024-49921, CVE-2024-50184, CVE-2024-50065, CVE-2024-49914, CVE-2024-50027, CVE-2024-50070, CVE-2024-50086, CVE-2024-50189, CVE-2024-56614, CVE-2024-50057, CVE-2024-50096, CVE-2024-50045, CVE-2024-50036, CVE-2024-56663, CVE-2024-50191, CVE-2024-50101) Update Instructions: Run `sudo pro fix USN-7383-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1018-realtime - 6.8.1-1018.19 linux-cloud-tools-6.8.1-1018-realtime - 6.8.1-1018.19 linux-headers-6.8.1-1018-realtime - 6.8.1-1018.19 linux-headers-realtime - 6.8.1-1018.19 linux-headers-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-6.8.1-1018-realtime - 6.8.1-1018.19 linux-image-realtime - 6.8.1-1018.19 linux-image-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-uc-6.8.1-1018-realtime - 6.8.1-1018.19 linux-image-uc-realtime - 6.8.1-1018.19 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-unsigned-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-extra-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1018.19 linux-realtime - 6.8.1-1018.19 linux-realtime-cloud-tools-6.8.1-1018 - 6.8.1-1018.19 linux-realtime-headers-6.8.1-1018 - 6.8.1-1018.19 linux-realtime-hwe-24.04 - 6.8.1-1018.19 linux-realtime-tools-6.8.1-1018 - 6.8.1-1018.19 linux-tools-6.8.1-1018-realtime - 6.8.1-1018.19 linux-tools-realtime - 6.8.1-1018.19 linux-tools-realtime-hwe-24.04 - 6.8.1-1018.19 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-47711
CVE-2024-47726
CVE-2024-49865
CVE-2024-49893
CVE-2024-49914
CVE-2024-49920
CVE-2024-49921
CVE-2024-49968
CVE-2024-49972
CVE-2024-50009
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50032
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50117
CVE-2024-50134
CVE-2024-50148
CVE-2024-50171
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50229
CVE-2024-50233
CVE-2024-53156
CVE-2024-53165
CVE-2024-53170
CVE-2024-56582
CVE-2024-56614
CVE-2024-56663
USN-7384-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49994, CVE-2024-47740, CVE-2024-49936, CVE-2024-47716, CVE-2024-47733, CVE-2024-50075, CVE-2024-49870, CVE-2024-50007, CVE-2024-49897, CVE-2024-49915, CVE-2024-47756, CVE-2024-47700, CVE-2024-49946, CVE-2024-50012, CVE-2024-47750, CVE-2024-49863, CVE-2024-50059, CVE-2024-50026, CVE-2024-49995, CVE-2024-50035, CVE-2024-47751, CVE-2024-50096, CVE-2024-50082, CVE-2024-50090, CVE-2024-50000, CVE-2024-47690, CVE-2024-47741, CVE-2024-49898, CVE-2024-47685, CVE-2024-50038, CVE-2024-49957, CVE-2024-47682, CVE-2024-50002, CVE-2024-47709, CVE-2024-50201, CVE-2024-49927, CVE-2024-50076, CVE-2024-56582, CVE-2024-47742, CVE-2024-47734, CVE-2024-50040, CVE-2024-49862, CVE-2024-49942, CVE-2024-50193, CVE-2024-49880, CVE-2024-50008, CVE-2024-49949, CVE-2024-50056, CVE-2024-50099, CVE-2024-50180, CVE-2024-50045, CVE-2024-49923, CVE-2024-49987, CVE-2024-49884, CVE-2024-50031, CVE-2024-47705, CVE-2024-47728, CVE-2024-49969, CVE-2024-50077, CVE-2024-50188, CVE-2024-49852, CVE-2024-49890, CVE-2024-47745, CVE-2024-50058, CVE-2024-50186, CVE-2024-47749, CVE-2024-56614, CVE-2024-50021, CVE-2024-50055, CVE-2024-47727, CVE-2024-47677, CVE-2024-49922, CVE-2024-50015, CVE-2024-50084, CVE-2024-47689, CVE-2024-50101, CVE-2024-47699, CVE-2024-49947, CVE-2024-49999, CVE-2024-49868, CVE-2024-50184, CVE-2024-50187, CVE-2024-47757, CVE-2024-49900, CVE-2024-47703, CVE-2024-49975, CVE-2024-47692, CVE-2024-49980, CVE-2024-49951, CVE-2024-49930, CVE-2024-49867, CVE-2024-49860, CVE-2024-50009, CVE-2024-50072, CVE-2024-50229, CVE-2024-49954, CVE-2024-50183, CVE-2024-49858, CVE-2024-49909, CVE-2024-49926, CVE-2024-47754, CVE-2024-50027, CVE-2024-50200, CVE-2024-50196, CVE-2024-50086, CVE-2024-47739, CVE-2024-49978, CVE-2024-49983, CVE-2024-49894, CVE-2024-49973, CVE-2024-49888, CVE-2024-49974, CVE-2024-47672, CVE-2024-49977, CVE-2024-47738, CVE-2024-49893, CVE-2024-49876, CVE-2024-49960, CVE-2024-49955, CVE-2024-47670, CVE-2024-47706, CVE-2024-49931, CVE-2024-47686, CVE-2024-49855, CVE-2024-49901, CVE-2024-47752, CVE-2024-47675, CVE-2024-47704, CVE-2024-47735, CVE-2024-47744, CVE-2024-50088, CVE-2024-50070, CVE-2024-47707, CVE-2024-50176, CVE-2024-50080, CVE-2024-50175, CVE-2024-47731, CVE-2024-49853, CVE-2024-49929, CVE-2024-49989, CVE-2024-49921, CVE-2024-49965, CVE-2024-49891, CVE-2024-50005, CVE-2024-47715, CVE-2024-50085, CVE-2024-50189, CVE-2024-47723, CVE-2024-50020, CVE-2024-49902, CVE-2024-47730, CVE-2024-53156, CVE-2024-49895, CVE-2024-49997, CVE-2024-50192, CVE-2024-49850, CVE-2024-50062, CVE-2024-50033, CVE-2024-49972, CVE-2024-49945, CVE-2024-50036, CVE-2024-50202, CVE-2024-50095, CVE-2024-49913, CVE-2024-50049, CVE-2024-50148, CVE-2024-49948, CVE-2024-49866, CVE-2024-49963, CVE-2024-49907, CVE-2024-50117, CVE-2024-49885, CVE-2024-49874, CVE-2024-50198, CVE-2024-49856, CVE-2024-49986, CVE-2024-49871, CVE-2024-50028, CVE-2024-49889, CVE-2024-50024, CVE-2024-47687, CVE-2024-50065, CVE-2024-49953, CVE-2024-47748, CVE-2024-47747, CVE-2024-47673, CVE-2024-49928, CVE-2024-50191, CVE-2024-50016, CVE-2024-53170, CVE-2024-49933, CVE-2024-50029, CVE-2024-50098, CVE-2024-49988, CVE-2024-49985, CVE-2024-50042, CVE-2024-50171, CVE-2024-50233, CVE-2024-49976, CVE-2024-49996, CVE-2024-49950, CVE-2024-49968, CVE-2024-50083, CVE-2024-49966, CVE-2024-49851, CVE-2024-50066, CVE-2024-49864, CVE-2024-50048, CVE-2024-50069, CVE-2024-50001, CVE-2024-50194, CVE-2024-47693, CVE-2024-49905, CVE-2024-50134, CVE-2024-49944, CVE-2024-50060, CVE-2024-49892, CVE-2024-49982, CVE-2024-49883, CVE-2024-49875, CVE-2024-47691, CVE-2024-47714, CVE-2024-47712, CVE-2024-50025, CVE-2024-50023, CVE-2024-47726, CVE-2024-50041, CVE-2024-49896, CVE-2024-50195, CVE-2024-47679, CVE-2024-47678, CVE-2024-49877, CVE-2024-47684, CVE-2024-47719, CVE-2024-49937, CVE-2024-53144, CVE-2024-47737, CVE-2024-49998, CVE-2024-49879, CVE-2024-50019, CVE-2024-50093, CVE-2024-50073, CVE-2024-50064, CVE-2024-50006, CVE-2024-47695, CVE-2024-49882, CVE-2024-50179, CVE-2024-49865, CVE-2024-47702, CVE-2024-50046, CVE-2024-49919, CVE-2024-47697, CVE-2024-50017, CVE-2024-50014, CVE-2024-49861, CVE-2024-50197, CVE-2024-49886, CVE-2024-49938, CVE-2024-49991, CVE-2024-49981, CVE-2024-56663, CVE-2024-49914, CVE-2024-49920, CVE-2024-47671, CVE-2024-49961, CVE-2024-47698, CVE-2024-49952, CVE-2024-47688, CVE-2024-50078, CVE-2024-50199, CVE-2024-49918, CVE-2024-50044, CVE-2024-50013, CVE-2024-47711, CVE-2024-49917, CVE-2024-50057, CVE-2024-47718, CVE-2024-49911, CVE-2024-49912, CVE-2024-53165, CVE-2024-50068, CVE-2024-50087, CVE-2024-47720, CVE-2024-49958, CVE-2024-49934, CVE-2024-49859, CVE-2024-47710, CVE-2024-49903, CVE-2024-49925, CVE-2024-50061, CVE-2024-41016, CVE-2024-47696, CVE-2024-47701, CVE-2024-49939, CVE-2024-49924, CVE-2024-49935, CVE-2024-50030, CVE-2024-50074, CVE-2024-47681, CVE-2024-47743, CVE-2024-49992, CVE-2024-49881, CVE-2024-50063, CVE-2024-47713, CVE-2024-50039, CVE-2024-50185, CVE-2024-49962, CVE-2024-50182, CVE-2024-50022, CVE-2024-49959, CVE-2024-50047, CVE-2024-53104, CVE-2024-49878, CVE-2024-47732, CVE-2024-47753) Update Instructions: Run `sudo pro fix USN-7384-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.8.0-1025 - 6.8.0-1025.30 linux-azure-fde-lts-24.04 - 6.8.0-1025.30 linux-azure-headers-6.8.0-1025 - 6.8.0-1025.30 linux-azure-lts-24.04 - 6.8.0-1025.30 linux-azure-tools-6.8.0-1025 - 6.8.0-1025.30 linux-buildinfo-6.8.0-1025-azure - 6.8.0-1025.30 linux-cloud-tools-6.8.0-1025-azure - 6.8.0-1025.30 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1025.30 linux-headers-6.8.0-1025-azure - 6.8.0-1025.30 linux-headers-azure-lts-24.04 - 6.8.0-1025.30 linux-image-6.8.0-1025-azure - 6.8.0-1025.30 linux-image-6.8.0-1025-azure-fde - 6.8.0-1025.30 linux-image-azure-fde-lts-24.04 - 6.8.0-1025.30 linux-image-azure-lts-24.04 - 6.8.0-1025.30 linux-image-unsigned-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-extra-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-extra-azure-lts-24.04 - 6.8.0-1025.30 linux-modules-involflt-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1025.30 linux-modules-iwlwifi-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1025.30 linux-tools-6.8.0-1025-azure - 6.8.0-1025.30 linux-tools-azure-lts-24.04 - 6.8.0-1025.30 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47711
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47726
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49865
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49893
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49914
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49920
CVE-2024-49921
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49968
CVE-2024-49969
CVE-2024-49972
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50009
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50117
CVE-2024-50134
CVE-2024-50148
CVE-2024-50171
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50229
CVE-2024-50233
CVE-2024-53104
CVE-2024-53144
CVE-2024-53156
CVE-2024-53165
CVE-2024-53170
CVE-2024-56582
CVE-2024-56614
CVE-2024-56663
CVE-2024-8805
CVE-2025-0927
CVE-2025-2312
USN-7385-1 -- Linux kernel (IBM) vulnerabilities
Ubuntu 24.04 LTS
Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49927, CVE-2024-47719, CVE-2024-49878, CVE-2024-50200, CVE-2024-50013, CVE-2024-50187, CVE-2024-49852, CVE-2024-49913, CVE-2024-50080, CVE-2024-49903, CVE-2024-47745, CVE-2024-50184, CVE-2024-50117, CVE-2024-49863, CVE-2024-49973, CVE-2024-47727, CVE-2024-53170, CVE-2024-49933, CVE-2024-49900, CVE-2024-50095, CVE-2024-49928, CVE-2024-49858, CVE-2024-47731, CVE-2024-49896, CVE-2024-53104, CVE-2024-49972, CVE-2024-49969, CVE-2024-50176, CVE-2024-47739, CVE-2024-49995, CVE-2024-49982, CVE-2024-50044, CVE-2024-49957, CVE-2024-47748, CVE-2024-47744, CVE-2024-49978, CVE-2024-49879, CVE-2024-49987, CVE-2024-49929, CVE-2024-49905, CVE-2024-47723, CVE-2024-53144, CVE-2024-50066, CVE-2024-47735, CVE-2024-50057, CVE-2024-49890, CVE-2024-49963, CVE-2024-49955, CVE-2024-49974, CVE-2024-50049, CVE-2024-47710, CVE-2024-47682, CVE-2024-47734, CVE-2024-47691, CVE-2024-49999, CVE-2024-50098, CVE-2024-47672, CVE-2024-50056, CVE-2024-49983, CVE-2024-50005, CVE-2024-50045, CVE-2024-49866, CVE-2024-49953, CVE-2024-47750, CVE-2024-49917, CVE-2024-50026, CVE-2024-50009, CVE-2024-47718, CVE-2024-50070, CVE-2024-47700, CVE-2024-49986, CVE-2024-49907, CVE-2024-49884, CVE-2024-50085, CVE-2024-50087, CVE-2024-49875, CVE-2024-47728, CVE-2024-49861, CVE-2024-49851, CVE-2024-49980, CVE-2024-49898, CVE-2024-47681, CVE-2024-49965, CVE-2024-49960, CVE-2024-50020, CVE-2024-50012, CVE-2024-50186, CVE-2024-49889, CVE-2024-50030, CVE-2024-50046, CVE-2024-50180, CVE-2024-49966, CVE-2024-49897, CVE-2024-49985, CVE-2024-49918, CVE-2024-47754, CVE-2024-50082, CVE-2024-47757, CVE-2024-47711, CVE-2024-47737, CVE-2024-47716, CVE-2024-50069, CVE-2024-47696, CVE-2024-50031, CVE-2024-50202, CVE-2024-47713, CVE-2024-49894, CVE-2024-49921, CVE-2024-50022, CVE-2024-49856, CVE-2024-47740, CVE-2024-49868, CVE-2024-49919, CVE-2024-47679, CVE-2024-47695, CVE-2024-47714, CVE-2024-49996, CVE-2024-50196, CVE-2024-49997, CVE-2024-49883, CVE-2024-49936, CVE-2024-49962, CVE-2024-47673, CVE-2024-56663, CVE-2024-49892, CVE-2024-47685, CVE-2024-50233, CVE-2024-49891, CVE-2024-47738, CVE-2024-49870, CVE-2024-49885, CVE-2024-50025, CVE-2024-50006, CVE-2024-49968, CVE-2024-47709, CVE-2024-47751, CVE-2024-50058, CVE-2024-50086, CVE-2024-50072, CVE-2024-50195, CVE-2024-56582, CVE-2024-50014, CVE-2024-49886, CVE-2024-47743, CVE-2024-50185, CVE-2024-50193, CVE-2024-49909, CVE-2024-50077, CVE-2024-49930, CVE-2024-49946, CVE-2024-50192, CVE-2024-50041, CVE-2024-47698, CVE-2024-50188, CVE-2024-49977, CVE-2024-47687, CVE-2024-49945, CVE-2024-50008, CVE-2024-49859, CVE-2024-50062, CVE-2024-49880, CVE-2024-47671, CVE-2024-49867, CVE-2024-49912, CVE-2024-56614, CVE-2024-49862, CVE-2024-50021, CVE-2024-47670, CVE-2024-49911, CVE-2024-49855, CVE-2024-47712, CVE-2024-50229, CVE-2024-50096, CVE-2024-49895, CVE-2024-47677, CVE-2024-49934, CVE-2024-53156, CVE-2024-49893, CVE-2024-49925, CVE-2024-50063, CVE-2024-49926, CVE-2024-50201, CVE-2024-50033, CVE-2024-50199, CVE-2024-49874, CVE-2024-47732, CVE-2024-50078, CVE-2024-49935, CVE-2024-49902, CVE-2024-49989, CVE-2024-47675, CVE-2024-50064, CVE-2024-50015, CVE-2024-41016, CVE-2024-49949, CVE-2024-50090, CVE-2024-49860, CVE-2024-50036, CVE-2024-50084, CVE-2024-50182, CVE-2024-50061, CVE-2024-47702, CVE-2024-47730, CVE-2024-49951, CVE-2024-49938, CVE-2024-50088, CVE-2024-50198, CVE-2024-49998, CVE-2024-49931, CVE-2024-49944, CVE-2024-50000, CVE-2024-49954, CVE-2024-47753, CVE-2024-49976, CVE-2024-50048, CVE-2024-49881, CVE-2024-50093, CVE-2024-50019, CVE-2024-50059, CVE-2024-50016, CVE-2024-50068, CVE-2024-49920, CVE-2024-50035, CVE-2024-50197, CVE-2024-47699, CVE-2024-49914, CVE-2024-50191, CVE-2024-50083, CVE-2024-47701, CVE-2024-49877, CVE-2024-50017, CVE-2024-49915, CVE-2024-50001, CVE-2024-49864, CVE-2024-50189, CVE-2024-50101, CVE-2024-47704, CVE-2024-50024, CVE-2024-50038, CVE-2024-49850, CVE-2024-50027, CVE-2024-49952, CVE-2024-50074, CVE-2024-50171, CVE-2024-53165, CVE-2024-47689, CVE-2024-49865, CVE-2024-49853, CVE-2024-47742, CVE-2024-49994, CVE-2024-50179, CVE-2024-47686, CVE-2024-49975, CVE-2024-49948, CVE-2024-50099, CVE-2024-50175, CVE-2024-50028, CVE-2024-49947, CVE-2024-47741, CVE-2024-49888, CVE-2024-50055, CVE-2024-47749, CVE-2024-49992, CVE-2024-47715, CVE-2024-49922, CVE-2024-47756, CVE-2024-50023, CVE-2024-47720, CVE-2024-50194, CVE-2024-47688, CVE-2024-49991, CVE-2024-47705, CVE-2024-49942, CVE-2024-50047, CVE-2024-49981, CVE-2024-49950, CVE-2024-47684, CVE-2024-50065, CVE-2024-49939, CVE-2024-47726, CVE-2024-47697, CVE-2024-49959, CVE-2024-47690, CVE-2024-50040, CVE-2024-50002, CVE-2024-50029, CVE-2024-47752, CVE-2024-49924, CVE-2024-50073, CVE-2024-47733, CVE-2024-50075, CVE-2024-49937, CVE-2024-47707, CVE-2024-47692, CVE-2024-47703, CVE-2024-49988, CVE-2024-50060, CVE-2024-50039, CVE-2024-49961, CVE-2024-50042, CVE-2024-50148, CVE-2024-47678, CVE-2024-49923, CVE-2024-49901, CVE-2024-47706, CVE-2024-49882, CVE-2024-47693, CVE-2024-49876, CVE-2024-47747, CVE-2024-49871, CVE-2024-50076, CVE-2024-50183, CVE-2024-50007, CVE-2024-49958, CVE-2024-50134) Update Instructions: Run `sudo pro fix USN-7385-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1022-ibm - 6.8.0-1022.22 linux-headers-6.8.0-1022-ibm - 6.8.0-1022.22 linux-headers-ibm - 6.8.0-1022.22 linux-headers-ibm-classic - 6.8.0-1022.22 linux-headers-ibm-lts-24.04 - 6.8.0-1022.22 linux-ibm - 6.8.0-1022.22 linux-ibm-classic - 6.8.0-1022.22 linux-ibm-headers-6.8.0-1022 - 6.8.0-1022.22 linux-ibm-lts-24.04 - 6.8.0-1022.22 linux-ibm-tools-6.8.0-1022 - 6.8.0-1022.22 linux-image-6.8.0-1022-ibm - 6.8.0-1022.22 linux-image-ibm - 6.8.0-1022.22 linux-image-ibm-classic - 6.8.0-1022.22 linux-image-ibm-lts-24.04 - 6.8.0-1022.22 linux-image-unsigned-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-extra-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-ibm-classic - 6.8.0-1022.22 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1022.22 linux-tools-6.8.0-1022-ibm - 6.8.0-1022.22 linux-tools-ibm - 6.8.0-1022.22 linux-tools-ibm-classic - 6.8.0-1022.22 linux-tools-ibm-lts-24.04 - 6.8.0-1022.22 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47711
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47715
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47726
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49865
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49893
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49914
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49920
CVE-2024-49921
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49968
CVE-2024-49969
CVE-2024-49972
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50009
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50117
CVE-2024-50134
CVE-2024-50148
CVE-2024-50171
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50229
CVE-2024-50233
CVE-2024-53104
CVE-2024-53144
CVE-2024-53156
CVE-2024-53165
CVE-2024-53170
CVE-2024-56582
CVE-2024-56614
CVE-2024-56663
CVE-2024-8805
CVE-2025-0927
USN-7386-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49952, CVE-2024-49920, CVE-2024-49945, CVE-2024-50180, CVE-2024-49944, CVE-2024-49987, CVE-2024-50148, CVE-2024-49959, CVE-2024-50063, CVE-2024-50083, CVE-2024-49878, CVE-2024-49870, CVE-2024-49863, CVE-2024-49921, CVE-2024-49992, CVE-2024-47691, CVE-2024-49913, CVE-2024-47712, CVE-2024-49948, CVE-2024-49976, CVE-2024-50085, CVE-2024-49891, CVE-2024-56614, CVE-2024-47713, CVE-2024-47703, CVE-2024-50191, CVE-2024-50087, CVE-2024-49958, CVE-2024-49868, CVE-2024-49922, CVE-2024-49960, CVE-2024-50019, CVE-2024-47749, CVE-2024-49996, CVE-2024-47677, CVE-2024-50065, CVE-2024-47744, CVE-2024-49968, CVE-2024-49985, CVE-2024-47752, CVE-2024-50017, CVE-2024-50183, CVE-2024-47709, CVE-2024-49938, CVE-2024-49876, CVE-2024-49893, CVE-2024-50134, CVE-2024-49972, CVE-2024-49934, CVE-2024-50015, CVE-2024-49856, CVE-2024-49853, CVE-2024-47711, CVE-2024-49949, CVE-2024-50026, CVE-2024-47681, CVE-2024-50000, CVE-2024-50189, CVE-2024-47716, CVE-2024-47723, CVE-2024-50044, CVE-2024-50179, CVE-2024-49871, CVE-2024-50008, CVE-2024-49955, CVE-2024-50007, CVE-2024-47695, CVE-2024-49889, CVE-2024-49954, CVE-2024-49894, CVE-2024-50014, CVE-2024-47731, CVE-2024-50055, CVE-2024-50098, CVE-2024-49930, CVE-2024-47684, CVE-2024-47705, CVE-2024-50029, CVE-2024-49901, CVE-2024-47689, CVE-2024-50022, CVE-2024-50009, CVE-2024-49937, CVE-2024-50197, CVE-2024-49911, CVE-2024-50076, CVE-2024-50002, CVE-2024-50077, CVE-2024-47679, CVE-2024-50025, CVE-2024-50069, CVE-2024-50101, CVE-2024-49942, CVE-2024-49986, CVE-2024-50012, CVE-2024-49858, CVE-2024-49884, CVE-2024-50201, CVE-2024-47701, CVE-2024-49994, CVE-2024-49897, CVE-2024-47687, CVE-2024-47751, CVE-2024-50001, CVE-2024-50117, CVE-2024-49909, CVE-2024-50086, CVE-2024-50064, CVE-2024-50088, CVE-2024-50005, CVE-2024-50184, CVE-2024-49882, CVE-2024-49936, CVE-2024-49933, CVE-2024-49995, CVE-2024-47704, CVE-2024-50066, CVE-2024-49898, CVE-2024-50068, CVE-2024-50192, CVE-2024-53104, CVE-2024-49860, CVE-2024-47741, CVE-2024-50039, CVE-2024-47699, CVE-2024-49861, CVE-2024-49969, CVE-2024-49950, CVE-2024-50194, CVE-2024-49929, CVE-2024-50006, CVE-2024-49997, CVE-2024-49983, CVE-2024-47710, CVE-2024-50200, CVE-2024-47692, CVE-2024-47748, CVE-2024-49855, CVE-2024-50182, CVE-2024-47706, CVE-2024-50188, CVE-2024-47732, CVE-2024-47707, CVE-2024-50048, CVE-2024-50058, CVE-2024-49912, CVE-2024-49966, CVE-2024-49852, CVE-2024-47753, CVE-2024-50202, CVE-2024-50062, CVE-2024-50056, CVE-2024-49946, CVE-2024-49902, CVE-2024-50033, CVE-2024-47750, CVE-2024-50021, CVE-2024-49939, CVE-2024-50072, CVE-2024-49851, CVE-2024-49928, CVE-2024-50061, CVE-2024-49885, CVE-2024-50047, CVE-2024-47672, CVE-2024-47734, CVE-2024-47714, CVE-2024-49886, CVE-2024-47730, CVE-2024-47697, CVE-2024-49973, CVE-2024-47718, CVE-2024-49862, CVE-2024-49963, CVE-2024-49881, CVE-2024-53165, CVE-2024-49998, CVE-2024-47757, CVE-2024-49982, CVE-2024-50186, CVE-2024-50016, CVE-2024-47675, CVE-2024-50090, CVE-2024-49917, CVE-2024-50031, CVE-2024-50093, CVE-2024-49859, CVE-2024-49890, CVE-2024-47670, CVE-2024-49919, CVE-2024-53156, CVE-2024-49924, CVE-2024-50078, CVE-2024-49864, CVE-2024-49962, CVE-2024-47720, CVE-2024-49874, CVE-2024-41016, CVE-2024-49991, CVE-2024-47726, CVE-2024-50171, CVE-2024-47682, CVE-2024-49865, CVE-2024-49988, CVE-2024-49903, CVE-2024-50035, CVE-2024-50229, CVE-2024-50075, CVE-2024-50195, CVE-2024-49947, CVE-2024-49900, CVE-2024-50040, CVE-2024-50176, CVE-2024-47686, CVE-2024-49978, CVE-2024-49923, CVE-2024-50199, CVE-2024-49999, CVE-2024-50070, CVE-2024-49953, CVE-2024-47733, CVE-2024-49888, CVE-2024-49977, CVE-2024-50080, CVE-2024-49905, CVE-2024-47737, CVE-2024-49961, CVE-2024-50030, CVE-2024-49951, CVE-2024-49892, CVE-2024-50096, CVE-2024-47735, CVE-2024-47673, CVE-2024-56663, CVE-2024-49981, CVE-2024-50049, CVE-2024-50193, CVE-2024-49957, CVE-2024-47742, CVE-2024-49880, CVE-2024-49965, CVE-2024-49927, CVE-2024-47690, CVE-2024-50057, CVE-2024-50073, CVE-2024-49931, CVE-2024-49875, CVE-2024-50041, CVE-2024-47700, CVE-2024-47719, CVE-2024-56582, CVE-2024-47738, CVE-2024-47754, CVE-2024-49850, CVE-2024-47678, CVE-2024-49935, CVE-2024-47739, CVE-2024-50028, CVE-2024-47727, CVE-2024-47728, CVE-2024-50084, CVE-2024-50095, CVE-2024-50175, CVE-2024-50198, CVE-2024-47702, CVE-2024-50187, CVE-2024-50032, CVE-2024-50074, CVE-2024-50020, CVE-2024-53144, CVE-2024-50233, CVE-2024-47698, CVE-2024-49879, CVE-2024-49896, CVE-2024-47747, CVE-2024-49877, CVE-2024-50046, CVE-2024-49866, CVE-2024-47740, CVE-2024-50042, CVE-2024-50060, CVE-2024-49925, CVE-2024-50013, CVE-2024-49867, CVE-2024-47685, CVE-2024-47743, CVE-2024-49883, CVE-2024-53170, CVE-2024-50038, CVE-2024-47756, CVE-2024-47696, CVE-2024-49980, CVE-2024-50185, CVE-2024-47693, CVE-2024-49915, CVE-2024-49914, CVE-2024-49907, CVE-2024-49989, CVE-2024-50196, CVE-2024-50027, CVE-2024-47745, CVE-2024-50045, CVE-2024-50024, CVE-2024-49918, CVE-2024-49975, CVE-2024-49974, CVE-2024-50082, CVE-2024-49895, CVE-2024-47671, CVE-2024-50059, CVE-2024-50099, CVE-2024-50023, CVE-2024-47688, CVE-2024-49926, CVE-2024-50036) Update Instructions: Run `sudo pro fix USN-7386-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-oem - 6.8.0-1024.24 linux-headers-6.8.0-1024-oem - 6.8.0-1024.24 linux-headers-oem-24.04 - 6.8.0-1024.24 linux-headers-oem-24.04a - 6.8.0-1024.24 linux-image-6.8.0-1024-oem - 6.8.0-1024.24 linux-image-oem-24.04 - 6.8.0-1024.24 linux-image-oem-24.04a - 6.8.0-1024.24 linux-image-uc-6.8.0-1024-oem - 6.8.0-1024.24 linux-image-uc-oem-24.04 - 6.8.0-1024.24 linux-image-uc-oem-24.04a - 6.8.0-1024.24 linux-image-unsigned-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-ipu6-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-ipu6-oem-24.04 - 6.8.0-1024.24 linux-modules-ipu6-oem-24.04a - 6.8.0-1024.24 linux-modules-iwlwifi-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1024.24 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1024.24 linux-modules-usbio-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-usbio-oem-24.04 - 6.8.0-1024.24 linux-modules-usbio-oem-24.04a - 6.8.0-1024.24 linux-oem-24.04 - 6.8.0-1024.24 linux-oem-24.04a - 6.8.0-1024.24 linux-oem-6.8-headers-6.8.0-1024 - 6.8.0-1024.24 linux-oem-6.8-tools-6.8.0-1024 - 6.8.0-1024.24 linux-tools-6.8.0-1024-oem - 6.8.0-1024.24 linux-tools-oem-24.04 - 6.8.0-1024.24 linux-tools-oem-24.04a - 6.8.0-1024.24 No subscription required
High
CVE-2024-41016
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47675
CVE-2024-47677
CVE-2024-47678
CVE-2024-47679
CVE-2024-47681
CVE-2024-47682
CVE-2024-47684
CVE-2024-47685
CVE-2024-47686
CVE-2024-47687
CVE-2024-47688
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47700
CVE-2024-47701
CVE-2024-47702
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47711
CVE-2024-47712
CVE-2024-47713
CVE-2024-47714
CVE-2024-47716
CVE-2024-47718
CVE-2024-47719
CVE-2024-47720
CVE-2024-47723
CVE-2024-47726
CVE-2024-47727
CVE-2024-47728
CVE-2024-47730
CVE-2024-47731
CVE-2024-47732
CVE-2024-47733
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47741
CVE-2024-47742
CVE-2024-47743
CVE-2024-47744
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47750
CVE-2024-47751
CVE-2024-47752
CVE-2024-47753
CVE-2024-47754
CVE-2024-47756
CVE-2024-47757
CVE-2024-49850
CVE-2024-49851
CVE-2024-49852
CVE-2024-49853
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49862
CVE-2024-49863
CVE-2024-49864
CVE-2024-49865
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49874
CVE-2024-49875
CVE-2024-49876
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49885
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49893
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49897
CVE-2024-49898
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49914
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49920
CVE-2024-49921
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49942
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49947
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49951
CVE-2024-49952
CVE-2024-49953
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49968
CVE-2024-49969
CVE-2024-49972
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49976
CVE-2024-49977
CVE-2024-49978
CVE-2024-49980
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49986
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49995
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-49999
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50005
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50009
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50032
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50117
CVE-2024-50134
CVE-2024-50148
CVE-2024-50171
CVE-2024-50175
CVE-2024-50176
CVE-2024-50179
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50229
CVE-2024-50233
CVE-2024-53104
CVE-2024-53144
CVE-2024-53156
CVE-2024-53165
CVE-2024-53170
CVE-2024-56582
CVE-2024-56614
CVE-2024-56663
CVE-2024-8805
CVE-2025-0927
USN-7395-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7395-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.48.0-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.48.0-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.48.0-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.48.0-0ubuntu0.24.04.1 webkit2gtk-driver - 2.48.0-0ubuntu0.24.04.1 No subscription required
High
CVE-2024-44192
CVE-2024-54467
CVE-2025-24201
USN-7396-1 -- OVN vulnerability
Ubuntu 24.04 LTS
Marius Berntsberg, Trygve Vea, Tore Anderson, Rodolfo Alonso, Jay Faulkner, and Brian Haley discovered that OVN incorrectly handled certain crafted UDP packets. A remote attacker could possibly use this issue to bypass egress ACL rules. Update Instructions: Run `sudo pro fix USN-7396-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ovn-central - 24.03.2-0ubuntu0.24.04.2 ovn-common - 24.03.2-0ubuntu0.24.04.2 ovn-controller-vtep - 24.03.2-0ubuntu0.24.04.2 ovn-doc - 24.03.2-0ubuntu0.24.04.2 ovn-docker - 24.03.2-0ubuntu0.24.04.2 ovn-host - 24.03.2-0ubuntu0.24.04.2 ovn-ic - 24.03.2-0ubuntu0.24.04.2 ovn-ic-db - 24.03.2-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2025-0650
USN-7398-1 -- libtar vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libtar may perform out-of-bounds reads when processing specially crafted tar files. An attacker could possibly use this issue to cause libtar to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2021-33643, CVE-2021-33644) It was discovered that libtar contained a memory leak due to failing to free a variable, causing performance degradation. An attacker could possibly use this issue to cause libtar to crash, resulting in a denial of service. (CVE-2021-33645, CVE-2021-33646) Update Instructions: Run `sudo pro fix USN-7398-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtar-dev - 1.2.20-8.1ubuntu0.24.04.1 libtar0t64 - 1.2.20-8.1ubuntu0.24.04.1 No subscription required
Medium
CVE-2021-33643
CVE-2021-33644
CVE-2021-33645
CVE-2021-33646
USN-7399-1 -- RabbitMQ Server vulnerability
Ubuntu 24.04 LTS
It was discovered that RabbitMQ Server's management UI did not sanitize certain input. An attacker could possibly use this issue to inject code by performing a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-7399-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rabbitmq-server - 3.12.1-1ubuntu1.2 No subscription required
Medium
CVE-2025-30219
USN-7400-1 -- PHP vulnerabilities
Ubuntu 24.04 LTS
It was discovered that PHP incorrectly handle certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2024-11235) It was discovered that PHP incorrectly handle certain folded headers. An attacker could possibly use this issue to cause a crash or execute arbritrary code. (CVE-2025-1217) It was discovered that PHP incorrectly handled certain headers. An attacker could possibly use this issue to expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS Ubuntu 24.10, and Ubuntu 24.04 LTS. (CVE-2025-1219) It was discovered that PHP incorrectly handle certain headers with invalid name and no colon. An attacker could possibly use this issue to confuse applications into accepting invalid headers causing code injection. (CVE-2025-1734) It was discovered that PHP incorrectly handled certain headers. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.10, and Ubuntu 24.04 LTS. (CVE-2025-1736) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2025-1861) Update Instructions: Run `sudo pro fix USN-7400-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.4 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.4 php8.3 - 8.3.6-0ubuntu0.24.04.4 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.4 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.4 php8.3-cgi - 8.3.6-0ubuntu0.24.04.4 php8.3-cli - 8.3.6-0ubuntu0.24.04.4 php8.3-common - 8.3.6-0ubuntu0.24.04.4 php8.3-curl - 8.3.6-0ubuntu0.24.04.4 php8.3-dba - 8.3.6-0ubuntu0.24.04.4 php8.3-dev - 8.3.6-0ubuntu0.24.04.4 php8.3-enchant - 8.3.6-0ubuntu0.24.04.4 php8.3-fpm - 8.3.6-0ubuntu0.24.04.4 php8.3-gd - 8.3.6-0ubuntu0.24.04.4 php8.3-gmp - 8.3.6-0ubuntu0.24.04.4 php8.3-imap - 8.3.6-0ubuntu0.24.04.4 php8.3-interbase - 8.3.6-0ubuntu0.24.04.4 php8.3-intl - 8.3.6-0ubuntu0.24.04.4 php8.3-ldap - 8.3.6-0ubuntu0.24.04.4 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.4 php8.3-mysql - 8.3.6-0ubuntu0.24.04.4 php8.3-odbc - 8.3.6-0ubuntu0.24.04.4 php8.3-opcache - 8.3.6-0ubuntu0.24.04.4 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.4 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.4 php8.3-pspell - 8.3.6-0ubuntu0.24.04.4 php8.3-readline - 8.3.6-0ubuntu0.24.04.4 php8.3-snmp - 8.3.6-0ubuntu0.24.04.4 php8.3-soap - 8.3.6-0ubuntu0.24.04.4 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.4 php8.3-sybase - 8.3.6-0ubuntu0.24.04.4 php8.3-tidy - 8.3.6-0ubuntu0.24.04.4 php8.3-xml - 8.3.6-0ubuntu0.24.04.4 php8.3-xsl - 8.3.6-0ubuntu0.24.04.4 php8.3-zip - 8.3.6-0ubuntu0.24.04.4 No subscription required
Medium
CVE-2024-11235
CVE-2025-1217
CVE-2025-1219
CVE-2025-1734
CVE-2025-1736
CVE-2025-1861
USN-7402-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-cloud-tools-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-cloud-tools-gkeop - 6.8.0-1009.11 linux-cloud-tools-gkeop-6.8 - 6.8.0-1009.11 linux-gkeop - 6.8.0-1009.11 linux-gkeop-6.8 - 6.8.0-1009.11 linux-gkeop-cloud-tools-6.8.0-1009 - 6.8.0-1009.11 linux-gkeop-headers-6.8.0-1009 - 6.8.0-1009.11 linux-gkeop-tools-6.8.0-1009 - 6.8.0-1009.11 linux-headers-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-headers-gkeop - 6.8.0-1009.11 linux-headers-gkeop-6.8 - 6.8.0-1009.11 linux-image-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-image-gkeop - 6.8.0-1009.11 linux-image-gkeop-6.8 - 6.8.0-1009.11 linux-image-unsigned-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-extra-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-extra-gkeop - 6.8.0-1009.11 linux-modules-extra-gkeop-6.8 - 6.8.0-1009.11 linux-tools-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-tools-gkeop - 6.8.0-1009.11 linux-tools-gkeop-6.8 - 6.8.0-1009.11 No subscription required linux-buildinfo-6.8.0-1022-gke - 6.8.0-1022.26 linux-gke - 6.8.0-1022.26 linux-gke-headers-6.8.0-1022 - 6.8.0-1022.26 linux-gke-tools-6.8.0-1022 - 6.8.0-1022.26 linux-headers-6.8.0-1022-gke - 6.8.0-1022.26 linux-headers-gke - 6.8.0-1022.26 linux-image-6.8.0-1022-gke - 6.8.0-1022.26 linux-image-gke - 6.8.0-1022.26 linux-image-unsigned-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-extra-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-iwlwifi-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-iwlwifi-gke - 6.8.0-1022.26 linux-tools-6.8.0-1022-gke - 6.8.0-1022.26 linux-tools-gke - 6.8.0-1022.26 No subscription required linux-buildinfo-6.8.0-1023-ibm - 6.8.0-1023.23 linux-headers-6.8.0-1023-ibm - 6.8.0-1023.23 linux-headers-ibm - 6.8.0-1023.23 linux-headers-ibm-classic - 6.8.0-1023.23 linux-headers-ibm-lts-24.04 - 6.8.0-1023.23 linux-ibm - 6.8.0-1023.23 linux-ibm-classic - 6.8.0-1023.23 linux-ibm-headers-6.8.0-1023 - 6.8.0-1023.23 linux-ibm-lts-24.04 - 6.8.0-1023.23 linux-ibm-tools-6.8.0-1023 - 6.8.0-1023.23 linux-image-6.8.0-1023-ibm - 6.8.0-1023.23 linux-image-ibm - 6.8.0-1023.23 linux-image-ibm-classic - 6.8.0-1023.23 linux-image-ibm-lts-24.04 - 6.8.0-1023.23 linux-image-unsigned-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-extra-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-ibm-classic - 6.8.0-1023.23 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1023.23 linux-tools-6.8.0-1023-ibm - 6.8.0-1023.23 linux-tools-ibm - 6.8.0-1023.23 linux-tools-ibm-classic - 6.8.0-1023.23 linux-tools-ibm-lts-24.04 - 6.8.0-1023.23 No subscription required linux-buildinfo-6.8.0-1023-oracle - 6.8.0-1023.24 linux-buildinfo-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-headers-6.8.0-1023-oracle - 6.8.0-1023.24 linux-headers-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-headers-oracle - 6.8.0-1023.24 linux-headers-oracle-64k - 6.8.0-1023.24 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-headers-oracle-lts-24.04 - 6.8.0-1023.24 linux-image-6.8.0-1023-oracle - 6.8.0-1023.24 linux-image-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-image-oracle - 6.8.0-1023.24 linux-image-oracle-64k - 6.8.0-1023.24 linux-image-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-image-oracle-lts-24.04 - 6.8.0-1023.24 linux-image-unsigned-6.8.0-1023-oracle - 6.8.0-1023.24 linux-image-unsigned-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-modules-6.8.0-1023-oracle - 6.8.0-1023.24 linux-modules-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-modules-extra-6.8.0-1023-oracle - 6.8.0-1023.24 linux-modules-extra-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-oracle - 6.8.0-1023.24 linux-oracle-64k - 6.8.0-1023.24 linux-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-oracle-headers-6.8.0-1023 - 6.8.0-1023.24 linux-oracle-lts-24.04 - 6.8.0-1023.24 linux-oracle-tools-6.8.0-1023 - 6.8.0-1023.24 linux-tools-6.8.0-1023-oracle - 6.8.0-1023.24 linux-tools-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-tools-oracle - 6.8.0-1023.24 linux-tools-oracle-64k - 6.8.0-1023.24 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-tools-oracle-lts-24.04 - 6.8.0-1023.24 No subscription required linux-buildinfo-6.8.0-1025-oem - 6.8.0-1025.25 linux-headers-6.8.0-1025-oem - 6.8.0-1025.25 linux-headers-oem-24.04 - 6.8.0-1025.25 linux-headers-oem-24.04a - 6.8.0-1025.25 linux-image-6.8.0-1025-oem - 6.8.0-1025.25 linux-image-oem-24.04 - 6.8.0-1025.25 linux-image-oem-24.04a - 6.8.0-1025.25 linux-image-uc-6.8.0-1025-oem - 6.8.0-1025.25 linux-image-uc-oem-24.04 - 6.8.0-1025.25 linux-image-uc-oem-24.04a - 6.8.0-1025.25 linux-image-unsigned-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-ipu6-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-ipu6-oem-24.04 - 6.8.0-1025.25 linux-modules-ipu6-oem-24.04a - 6.8.0-1025.25 linux-modules-iwlwifi-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1025.25 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1025.25 linux-modules-usbio-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-usbio-oem-24.04 - 6.8.0-1025.25 linux-modules-usbio-oem-24.04a - 6.8.0-1025.25 linux-oem-24.04 - 6.8.0-1025.25 linux-oem-24.04a - 6.8.0-1025.25 linux-oem-6.8-headers-6.8.0-1025 - 6.8.0-1025.25 linux-oem-6.8-tools-6.8.0-1025 - 6.8.0-1025.25 linux-tools-6.8.0-1025-oem - 6.8.0-1025.25 linux-tools-oem-24.04 - 6.8.0-1025.25 linux-tools-oem-24.04a - 6.8.0-1025.25 No subscription required linux-aws - 6.8.0-1026.28 linux-aws-cloud-tools-6.8.0-1026 - 6.8.0-1026.28 linux-aws-headers-6.8.0-1026 - 6.8.0-1026.28 linux-aws-lts-24.04 - 6.8.0-1026.28 linux-aws-tools-6.8.0-1026 - 6.8.0-1026.28 linux-buildinfo-6.8.0-1026-aws - 6.8.0-1026.28 linux-cloud-tools-6.8.0-1026-aws - 6.8.0-1026.28 linux-headers-6.8.0-1026-aws - 6.8.0-1026.28 linux-headers-aws - 6.8.0-1026.28 linux-headers-aws-lts-24.04 - 6.8.0-1026.28 linux-image-6.8.0-1026-aws - 6.8.0-1026.28 linux-image-aws - 6.8.0-1026.28 linux-image-aws-lts-24.04 - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-extra-aws - 6.8.0-1026.28 linux-modules-extra-aws-lts-24.04 - 6.8.0-1026.28 linux-tools-6.8.0-1026-aws - 6.8.0-1026.28 linux-tools-aws - 6.8.0-1026.28 linux-tools-aws-lts-24.04 - 6.8.0-1026.28 No subscription required linux-buildinfo-6.8.0-1027-gcp - 6.8.0-1027.29 linux-buildinfo-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-gcp - 6.8.0-1027.29 linux-gcp-64k - 6.8.0-1027.29 linux-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-gcp-headers-6.8.0-1027 - 6.8.0-1027.29 linux-gcp-lts-24.04 - 6.8.0-1027.29 linux-gcp-tools-6.8.0-1027 - 6.8.0-1027.29 linux-headers-6.8.0-1027-gcp - 6.8.0-1027.29 linux-headers-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-headers-gcp - 6.8.0-1027.29 linux-headers-gcp-64k - 6.8.0-1027.29 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-headers-gcp-lts-24.04 - 6.8.0-1027.29 linux-image-6.8.0-1027-gcp - 6.8.0-1027.29 linux-image-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-image-gcp - 6.8.0-1027.29 linux-image-gcp-64k - 6.8.0-1027.29 linux-image-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-image-gcp-lts-24.04 - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-gcp - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-6.8.0-1027-gcp - 6.8.0-1027.29 linux-modules-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-gcp - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-extra-gcp - 6.8.0-1027.29 linux-modules-extra-gcp-64k - 6.8.0-1027.29 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1027.29 linux-tools-6.8.0-1027-gcp - 6.8.0-1027.29 linux-tools-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-tools-gcp - 6.8.0-1027.29 linux-tools-gcp-64k - 6.8.0-1027.29 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-tools-gcp-lts-24.04 - 6.8.0-1027.29 No subscription required linux-bpf-dev - 6.8.0-57.59 linux-buildinfo-6.8.0-57-generic - 6.8.0-57.59 linux-buildinfo-6.8.0-57-generic-64k - 6.8.0-57.59 linux-cloud-tools-6.8.0-57 - 6.8.0-57.59 linux-cloud-tools-6.8.0-57-generic - 6.8.0-57.59 linux-cloud-tools-common - 6.8.0-57.59 linux-cloud-tools-generic - 6.8.0-57.59 linux-cloud-tools-virtual - 6.8.0-57.59 linux-crashdump - 6.8.0-57.59 linux-doc - 6.8.0-57.59 linux-generic - 6.8.0-57.59 linux-generic-64k - 6.8.0-57.59 linux-generic-lpae - 6.8.0-57.59 linux-headers-6.8.0-57 - 6.8.0-57.59 linux-headers-6.8.0-57-generic - 6.8.0-57.59 linux-headers-6.8.0-57-generic-64k - 6.8.0-57.59 linux-headers-generic - 6.8.0-57.59 linux-headers-generic-64k - 6.8.0-57.59 linux-headers-generic-lpae - 6.8.0-57.59 linux-headers-kvm - 6.8.0-57.59 linux-headers-laptop-23.10 - 6.8.0-57.59 linux-headers-oem-20.04 - 6.8.0-57.59 linux-headers-oem-20.04b - 6.8.0-57.59 linux-headers-oem-20.04c - 6.8.0-57.59 linux-headers-oem-20.04d - 6.8.0-57.59 linux-headers-oem-22.04 - 6.8.0-57.59 linux-headers-virtual - 6.8.0-57.59 linux-image-6.8.0-57-generic - 6.8.0-57.59 linux-image-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-extra-virtual - 6.8.0-57.59 linux-image-generic - 6.8.0-57.59 linux-image-generic-64k - 6.8.0-57.59 linux-image-generic-lpae - 6.8.0-57.59 linux-image-kvm - 6.8.0-57.59 linux-image-laptop-23.10 - 6.8.0-57.59 linux-image-oem-20.04 - 6.8.0-57.59 linux-image-oem-20.04b - 6.8.0-57.59 linux-image-oem-20.04c - 6.8.0-57.59 linux-image-oem-20.04d - 6.8.0-57.59 linux-image-oem-22.04 - 6.8.0-57.59 linux-image-uc-6.8.0-57-generic - 6.8.0-57.59 linux-image-uc-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-uc-generic - 6.8.0-57.59 linux-image-unsigned-6.8.0-57-generic - 6.8.0-57.59 linux-image-unsigned-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-virtual - 6.8.0-57.59 linux-kvm - 6.8.0-57.59 linux-laptop-23.10 - 6.8.0-57.59 linux-lib-rust-6.8.0-57-generic - 6.8.0-57.59 linux-libc-dev - 6.8.0-57.59 linux-modules-6.8.0-57-generic - 6.8.0-57.59 linux-modules-6.8.0-57-generic-64k - 6.8.0-57.59 linux-modules-extra-6.8.0-57-generic - 6.8.0-57.59 linux-modules-ipu6-6.8.0-57-generic - 6.8.0-57.59 linux-modules-ipu6-generic - 6.8.0-57.59 linux-modules-iwlwifi-6.8.0-57-generic - 6.8.0-57.59 linux-modules-iwlwifi-generic - 6.8.0-57.59 linux-modules-iwlwifi-oem-20.04 - 6.8.0-57.59 linux-modules-iwlwifi-oem-20.04d - 6.8.0-57.59 linux-modules-iwlwifi-oem-22.04 - 6.8.0-57.59 linux-modules-usbio-6.8.0-57-generic - 6.8.0-57.59 linux-modules-usbio-generic - 6.8.0-57.59 linux-oem-20.04 - 6.8.0-57.59 linux-oem-20.04b - 6.8.0-57.59 linux-oem-20.04c - 6.8.0-57.59 linux-oem-20.04d - 6.8.0-57.59 linux-oem-22.04 - 6.8.0-57.59 linux-source - 6.8.0-57.59 linux-source-6.8.0 - 6.8.0-57.59 linux-tools-6.8.0-57 - 6.8.0-57.59 linux-tools-6.8.0-57-generic - 6.8.0-57.59 linux-tools-6.8.0-57-generic-64k - 6.8.0-57.59 linux-tools-common - 6.8.0-57.59 linux-tools-generic - 6.8.0-57.59 linux-tools-generic-64k - 6.8.0-57.59 linux-tools-generic-lpae - 6.8.0-57.59 linux-tools-host - 6.8.0-57.59 linux-tools-kvm - 6.8.0-57.59 linux-tools-laptop-23.10 - 6.8.0-57.59 linux-tools-oem-20.04 - 6.8.0-57.59 linux-tools-oem-20.04b - 6.8.0-57.59 linux-tools-oem-20.04c - 6.8.0-57.59 linux-tools-oem-20.04d - 6.8.0-57.59 linux-tools-oem-22.04 - 6.8.0-57.59 linux-tools-virtual - 6.8.0-57.59 linux-virtual - 6.8.0-57.59 No subscription required linux-buildinfo-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-buildinfo-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-cloud-tools-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-cloud-tools-lowlatency - 6.8.0-57.59.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-headers-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-headers-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-headers-lowlatency - 6.8.0-57.59.1 linux-headers-lowlatency-64k - 6.8.0-57.59.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-image-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-image-lowlatency - 6.8.0-57.59.1 linux-image-lowlatency-64k - 6.8.0-57.59.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-unsigned-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-image-unsigned-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-lowlatency - 6.8.0-57.59.1 linux-lowlatency-64k - 6.8.0-57.59.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-lowlatency-cloud-tools-6.8.0-57 - 6.8.0-57.59.1 linux-lowlatency-headers-6.8.0-57 - 6.8.0-57.59.1 linux-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-lowlatency-lib-rust-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-lowlatency-tools-6.8.0-57 - 6.8.0-57.59.1 linux-modules-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-modules-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-modules-iwlwifi-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-modules-iwlwifi-lowlatency - 6.8.0-57.59.1 linux-tools-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-tools-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-tools-lowlatency - 6.8.0-57.59.1 linux-tools-lowlatency-64k - 6.8.0-57.59.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 No subscription required
High
CVE-2024-50302
CVE-2024-53063
CVE-2024-53140
CVE-2024-56595
CVE-2024-56598
CVE-2024-56658
CVE-2024-56672
CVE-2024-57798
USN-7402-2 -- Linux kernel (Real-time) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1019-realtime - 6.8.1-1019.20 linux-cloud-tools-6.8.1-1019-realtime - 6.8.1-1019.20 linux-headers-6.8.1-1019-realtime - 6.8.1-1019.20 linux-headers-realtime - 6.8.1-1019.20 linux-headers-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-6.8.1-1019-realtime - 6.8.1-1019.20 linux-image-realtime - 6.8.1-1019.20 linux-image-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-uc-6.8.1-1019-realtime - 6.8.1-1019.20 linux-image-uc-realtime - 6.8.1-1019.20 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-unsigned-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-extra-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1019.20 linux-realtime - 6.8.1-1019.20 linux-realtime-cloud-tools-6.8.1-1019 - 6.8.1-1019.20 linux-realtime-headers-6.8.1-1019 - 6.8.1-1019.20 linux-realtime-hwe-24.04 - 6.8.1-1019.20 linux-realtime-tools-6.8.1-1019 - 6.8.1-1019.20 linux-tools-6.8.1-1019-realtime - 6.8.1-1019.20 linux-tools-realtime - 6.8.1-1019.20 linux-tools-realtime-hwe-24.04 - 6.8.1-1019.20 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-50302
CVE-2024-53063
CVE-2024-53140
CVE-2024-56595
CVE-2024-56598
CVE-2024-56658
CVE-2024-56672
CVE-2024-57798
USN-7402-3 -- Linux kernel (NVIDIA) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-buildinfo-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-cloud-tools-nvidia - 6.8.0-1025.28 linux-headers-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-headers-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-headers-nvidia - 6.8.0-1025.28 linux-headers-nvidia-64k - 6.8.0-1025.28 linux-image-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-image-nvidia - 6.8.0-1025.28 linux-image-nvidia-64k - 6.8.0-1025.28 linux-image-uc-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-uc-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-extra-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-nvidia-fs-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1025.28 linux-nvidia - 6.8.0-1025.28 linux-nvidia-64k - 6.8.0-1025.28 linux-nvidia-headers-6.8.0-1025 - 6.8.0-1025.28 linux-nvidia-tools-6.8.0-1025 - 6.8.0-1025.28 linux-tools-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-tools-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-tools-nvidia - 6.8.0-1025.28 linux-tools-nvidia-64k - 6.8.0-1025.28 No subscription required
High
CVE-2024-50302
CVE-2024-53063
CVE-2024-53140
CVE-2024-56595
CVE-2024-56598
CVE-2024-56658
CVE-2024-56672
CVE-2024-57798
USN-7402-4 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-buildinfo-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-headers-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-uc-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-uc-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-unsigned-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-unsigned-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-extra-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-nvidia-lowlatency - 6.8.0-1025.28.1 linux-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-nvidia-lowlatency-headers-6.8.0-1025 - 6.8.0-1025.28.1 linux-nvidia-lowlatency-tools-6.8.0-1025 - 6.8.0-1025.28.1 linux-tools-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-tools-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-tools-nvidia-lowlatency - 6.8.0-1025.28.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1025.28.1 No subscription required linux-azure-cloud-tools-6.8.0-1026 - 6.8.0-1026.31 linux-azure-fde-lts-24.04 - 6.8.0-1026.31 linux-azure-headers-6.8.0-1026 - 6.8.0-1026.31 linux-azure-lts-24.04 - 6.8.0-1026.31 linux-azure-tools-6.8.0-1026 - 6.8.0-1026.31 linux-buildinfo-6.8.0-1026-azure - 6.8.0-1026.31 linux-cloud-tools-6.8.0-1026-azure - 6.8.0-1026.31 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1026.31 linux-headers-6.8.0-1026-azure - 6.8.0-1026.31 linux-headers-azure-lts-24.04 - 6.8.0-1026.31 linux-image-6.8.0-1026-azure - 6.8.0-1026.31 linux-image-6.8.0-1026-azure-fde - 6.8.0-1026.31 linux-image-azure-fde-lts-24.04 - 6.8.0-1026.31 linux-image-azure-lts-24.04 - 6.8.0-1026.31 linux-image-unsigned-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-extra-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-extra-azure-lts-24.04 - 6.8.0-1026.31 linux-modules-involflt-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1026.31 linux-modules-iwlwifi-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1026.31 linux-tools-6.8.0-1026-azure - 6.8.0-1026.31 linux-tools-azure-lts-24.04 - 6.8.0-1026.31 No subscription required
High
CVE-2024-50302
CVE-2024-53063
CVE-2024-53140
CVE-2024-56595
CVE-2024-56598
CVE-2024-56658
CVE-2024-56672
CVE-2024-57798
USN-7409-1 -- RubySAML vulnerabilities
Ubuntu 24.04 LTS
It was discovered that ruby-saml did not correctly handle XML parsing. An attacker could possibly use this issue to perform a signature wrapping attack and bypass authentication. (CVE-2025-25291 and CVE-2025-25292) It was discovered that ruby-saml did not correctly handle decompressing SAML responses. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-25293) Update Instructions: Run `sudo pro fix USN-7409-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-saml - 1.15.0-1ubuntu0.24.04.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2025-25291
CVE-2025-25292
CVE-2025-25293
USN-7411-1 -- OpenVPN vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenVPN incorrectly handled certain malformed packets. A remote attacker could possibly use this issue to cause OpenVPN to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7411-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.12-0ubuntu0.24.04.3 No subscription required
Medium
CVE-2025-2704
USN-7412-1 -- GnuPG vulnerability
Ubuntu 24.04 LTS
It was discovered that GnuPG incorrectly handled importing keys with certain crafted subkey data. If a user or automated system were tricked into importing a specially crafted key, a remote attacker may prevent users from importing other keys in the future. Update Instructions: Run `sudo pro fix USN-7412-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr - 2.4.4-2ubuntu17.2 gnupg - 2.4.4-2ubuntu17.2 gnupg-agent - 2.4.4-2ubuntu17.2 gnupg-l10n - 2.4.4-2ubuntu17.2 gnupg-utils - 2.4.4-2ubuntu17.2 gnupg2 - 2.4.4-2ubuntu17.2 gpg - 2.4.4-2ubuntu17.2 gpg-agent - 2.4.4-2ubuntu17.2 gpg-wks-client - 2.4.4-2ubuntu17.2 gpg-wks-server - 2.4.4-2ubuntu17.2 gpgconf - 2.4.4-2ubuntu17.2 gpgsm - 2.4.4-2ubuntu17.2 gpgv - 2.4.4-2ubuntu17.2 gpgv-static - 2.4.4-2ubuntu17.2 gpgv-win32 - 2.4.4-2ubuntu17.2 keyboxd - 2.4.4-2ubuntu17.2 scdaemon - 2.4.4-2ubuntu17.2 No subscription required
Medium
CVE-2025-30258
USN-7414-1 -- XZ Utils vulnerability
Ubuntu 24.04 LTS
Harri K. Koskinen discovered that XZ Utils incorrectly handled the threaded xz decoder. If a user or automated system were tricked into processing an xz file, a remote attacker could use this issue to cause XZ Utils to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7414-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liblzma-dev - 5.6.1+really5.4.5-1ubuntu0.2 liblzma-doc - 5.6.1+really5.4.5-1ubuntu0.2 liblzma5 - 5.6.1+really5.4.5-1ubuntu0.2 xz-utils - 5.6.1+really5.4.5-1ubuntu0.2 xzdec - 5.6.1+really5.4.5-1ubuntu0.2 No subscription required
Medium
CVE-2025-31115
USN-7418-1 -- Ruby vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123, CVE-2024-43398) It was discovered that Ruby incorrectly handled expanding ranges in the net-imap response parser. If a user or automated system were tricked into connecting to a malicious IMAP server, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-25186) It was discovered that the Ruby CGI gem incorrectly handled parsing certain cookies. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27219) It was discovered that the Ruby CGI gem incorrectly handled parsing certain regular expressions. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27220) It was discovered that the Ruby URI gem incorrectly handled certain URI handling methods. A remote attacker could possibly use this issue to leak authentication credentials. (CVE-2025-27221) Update Instructions: Run `sudo pro fix USN-7418-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.2 - 3.2.3-1ubuntu0.24.04.5 ruby3.2 - 3.2.3-1ubuntu0.24.04.5 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.5 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.5 No subscription required
Medium
CVE-2024-35176
CVE-2024-39908
CVE-2024-41123
CVE-2024-43398
CVE-2025-25186
CVE-2025-27219
CVE-2025-27220
CVE-2025-27221
USN-7419-1 -- Vim vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Vim incorrectly handled memory when using invalid input with the log option. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1215) It was discovered that Vim incorrectly handled memory when redirecting certain output to the register. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-26603) Update Instructions: Run `sudo pro fix USN-7419-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.8 vim-athena - 2:9.1.0016-1ubuntu7.8 vim-common - 2:9.1.0016-1ubuntu7.8 vim-doc - 2:9.1.0016-1ubuntu7.8 vim-gtk3 - 2:9.1.0016-1ubuntu7.8 vim-gui-common - 2:9.1.0016-1ubuntu7.8 vim-motif - 2:9.1.0016-1ubuntu7.8 vim-nox - 2:9.1.0016-1ubuntu7.8 vim-runtime - 2:9.1.0016-1ubuntu7.8 vim-tiny - 2:9.1.0016-1ubuntu7.8 xxd - 2:9.1.0016-1ubuntu7.8 No subscription required
Medium
CVE-2025-1215
CVE-2025-26603
USN-7423-1 -- GNU binutils vulnerabilities
Ubuntu 24.04 LTS
It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. (CVE-2025-1153, CVE-2025-1182) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-1176) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-1178, CVE-2025-1181) Update Instructions: Run `sudo pro fix USN-7423-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.42-4ubuntu2.5 binutils-aarch64-linux-gnu - 2.42-4ubuntu2.5 binutils-alpha-linux-gnu - 2.42-4ubuntu2.5 binutils-arc-linux-gnu - 2.42-4ubuntu2.5 binutils-arm-linux-gnueabi - 2.42-4ubuntu2.5 binutils-arm-linux-gnueabihf - 2.42-4ubuntu2.5 binutils-common - 2.42-4ubuntu2.5 binutils-dev - 2.42-4ubuntu2.5 binutils-doc - 2.42-4ubuntu2.5 binutils-for-build - 2.42-4ubuntu2.5 binutils-for-host - 2.42-4ubuntu2.5 binutils-hppa-linux-gnu - 2.42-4ubuntu2.5 binutils-hppa64-linux-gnu - 2.42-4ubuntu2.5 binutils-i686-gnu - 2.42-4ubuntu2.5 binutils-i686-kfreebsd-gnu - 2.42-4ubuntu2.5 binutils-i686-linux-gnu - 2.42-4ubuntu2.5 binutils-ia64-linux-gnu - 2.42-4ubuntu2.5 binutils-loongarch64-linux-gnu - 2.42-4ubuntu2.5 binutils-m68k-linux-gnu - 2.42-4ubuntu2.5 binutils-multiarch - 2.42-4ubuntu2.5 binutils-multiarch-dev - 2.42-4ubuntu2.5 binutils-powerpc-linux-gnu - 2.42-4ubuntu2.5 binutils-powerpc64-linux-gnu - 2.42-4ubuntu2.5 binutils-powerpc64le-linux-gnu - 2.42-4ubuntu2.5 binutils-riscv64-linux-gnu - 2.42-4ubuntu2.5 binutils-s390x-linux-gnu - 2.42-4ubuntu2.5 binutils-sh4-linux-gnu - 2.42-4ubuntu2.5 binutils-source - 2.42-4ubuntu2.5 binutils-sparc64-linux-gnu - 2.42-4ubuntu2.5 binutils-x86-64-gnu - 2.42-4ubuntu2.5 binutils-x86-64-kfreebsd-gnu - 2.42-4ubuntu2.5 binutils-x86-64-linux-gnu - 2.42-4ubuntu2.5 binutils-x86-64-linux-gnux32 - 2.42-4ubuntu2.5 libbinutils - 2.42-4ubuntu2.5 libctf-nobfd0 - 2.42-4ubuntu2.5 libctf0 - 2.42-4ubuntu2.5 libgprofng0 - 2.42-4ubuntu2.5 libsframe1 - 2.42-4ubuntu2.5 No subscription required
Medium
CVE-2025-1153
CVE-2025-1176
CVE-2025-1178
CVE-2025-1181
CVE-2025-1182
USN-7424-1 -- Expat vulnerability
Ubuntu 24.04 LTS
It was discovered that Expat could crash due to stack overflow when processing XML documents with deeply nested entity references. If a user or automated system were tricked into processing specially crafted XML input, an attacker could use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7424-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.3 libexpat1 - 2.6.1-2ubuntu0.3 libexpat1-dev - 2.6.1-2ubuntu0.3 No subscription required
Medium
CVE-2024-8176
USN-7425-1 -- Erlang vulnerability
Ubuntu 24.04 LTS
It was discovered that Erlang OTP's SSH module did not limit the size of certain data in initialization messages. An attacker could possibly use this issue to consume large amount of memory leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7425-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.2 No subscription required
Medium
CVE-2025-30211
USN-7426-1 -- poppler vulnerabilities
Ubuntu 24.04 LTS
It was discovered that poppler incorrectly handled memory when opening certain PDF files. An attacker could possibly use this issue to cause poppler to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7426-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.3 libpoppler-cpp-dev - 24.02.0-1ubuntu9.3 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.3 libpoppler-dev - 24.02.0-1ubuntu9.3 libpoppler-glib-dev - 24.02.0-1ubuntu9.3 libpoppler-glib-doc - 24.02.0-1ubuntu9.3 libpoppler-glib8t64 - 24.02.0-1ubuntu9.3 libpoppler-private-dev - 24.02.0-1ubuntu9.3 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.3 libpoppler-qt5-dev - 24.02.0-1ubuntu9.3 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.3 libpoppler-qt6-dev - 24.02.0-1ubuntu9.3 libpoppler134 - 24.02.0-1ubuntu9.3 poppler-utils - 24.02.0-1ubuntu9.3 No subscription required
Medium
CVE-2025-32364
CVE-2025-32365
USN-7427-1 -- .NET vulnerability
Ubuntu 24.04 LTS
James Newton-King discovered that .NET did not properly limit resource allocation when handling certain HTTP/3 requests. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7427-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.115-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.115-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.115-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.115-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.115-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.115-8.0.15-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.15-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.15-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2025-26682
USN-7431-1 -- HAProxy vulnerability
Ubuntu 24.04 LTS
Aleandro Prudenzano and Edoardo Geraci discovered that HAProxy incorrectly handled certain uncommon configurations that replace multiple short patterns with a longer one. A remote attacker could use this issue to cause HAProxy to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7431-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: haproxy - 2.8.5-1ubuntu3.3 haproxy-doc - 2.8.5-1ubuntu3.3 vim-haproxy - 2.8.5-1ubuntu3.3 No subscription required
Medium
CVE-2025-32464
USN-7432-1 -- libsoup vulnerabilities
Ubuntu 24.04 LTS
It was discovered that libsoup could be made to read out of bounds. An attacker could possibly use this issue to cause applications using libsoup to crash, resulting in a denial of service. (CVE-2025-2784, CVE-2025-32050, CVE-2025-32052, CVE-2025-32053) It was discovered that libsoup could be made to dereference invalid memory. An attacker could possibly use this issue to cause applications using libsoup to crash, resulting in a denial of service. (CVE-2025-32051) Update Instructions: Run `sudo pro fix USN-7432-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.2 libsoup-2.4-1 - 2.74.3-6ubuntu1.2 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.2 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.2 libsoup2.4-common - 2.74.3-6ubuntu1.2 libsoup2.4-dev - 2.74.3-6ubuntu1.2 libsoup2.4-doc - 2.74.3-6ubuntu1.2 libsoup2.4-tests - 2.74.3-6ubuntu1.2 No subscription required gir1.2-soup-3.0 - 3.4.4-5ubuntu0.2 libsoup-3.0-0 - 3.4.4-5ubuntu0.2 libsoup-3.0-common - 3.4.4-5ubuntu0.2 libsoup-3.0-dev - 3.4.4-5ubuntu0.2 libsoup-3.0-doc - 3.4.4-5ubuntu0.2 libsoup-3.0-tests - 3.4.4-5ubuntu0.2 No subscription required
Medium
CVE-2025-2784
CVE-2025-32050
CVE-2025-32051
CVE-2025-32052
CVE-2025-32053
USN-7433-1 -- GraphicsMagick vulnerabilities
Ubuntu 24.04 LTS
It was discovered that GraphicsMagick did not properly limit image dimensions, which could lead to excessive memory consumption. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-27795) It was discovered that GraphicsMagick did not properly handle certain memory operations, which could lead to a out-of-bounds memory access. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 24.10. (CVE-2025-27796) Update Instructions: Run `sudo pro fix USN-7433-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: graphicsmagick - 1.4+really1.3.42-1.1ubuntu0.1~esm1 graphicsmagick-imagemagick-compat - 1.4+really1.3.42-1.1ubuntu0.1~esm1 graphicsmagick-libmagick-dev-compat - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphics-magick-perl - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick++-q16-12t64 - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick++1-dev - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick-q16-3t64 - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick1-dev - 1.4+really1.3.42-1.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2025-27795
CVE-2025-27796
USN-7434-1 -- Perl vulnerability
Ubuntu 24.04 LTS
It was discovered that Perl incorrectly handled transliterating non-ASCII bytes. A remote attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7434-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libperl-dev - 5.38.2-3.2ubuntu0.1 libperl5.38t64 - 5.38.2-3.2ubuntu0.1 perl - 5.38.2-3.2ubuntu0.1 perl-base - 5.38.2-3.2ubuntu0.1 perl-debug - 5.38.2-3.2ubuntu0.1 perl-doc - 5.38.2-3.2ubuntu0.1 perl-modules-5.38 - 5.38.2-3.2ubuntu0.1 No subscription required
Medium
CVE-2024-56406
USN-7435-1 -- Protocol Buffers vulnerability
Ubuntu 24.04 LTS
It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7435-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: elpa-protobuf-mode - 3.21.12-8.2ubuntu0.1 libprotobuf-dev - 3.21.12-8.2ubuntu0.1 libprotobuf-java - 3.21.12-8.2ubuntu0.1 libprotobuf-lite32t64 - 3.21.12-8.2ubuntu0.1 libprotobuf32t64 - 3.21.12-8.2ubuntu0.1 libprotoc-dev - 3.21.12-8.2ubuntu0.1 libprotoc32t64 - 3.21.12-8.2ubuntu0.1 php-google-protobuf - 3.21.12-8.2ubuntu0.1 protobuf-compiler - 3.21.12-8.2ubuntu0.1 python3-protobuf - 3.21.12-8.2ubuntu0.1 ruby-google-protobuf - 3.21.12-8.2ubuntu0.1 No subscription required
Medium
CVE-2024-7254
USN-7436-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7436-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.48.1-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.48.1-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.48.1-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.48.1-0ubuntu0.24.04.1 webkit2gtk-driver - 2.48.1-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-54551
CVE-2025-24208
CVE-2025-24209
CVE-2025-24213
CVE-2025-24216
CVE-2025-24264
CVE-2025-30427
USN-7437-1 -- CImg library vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the CImg library did not properly check the size of images before loading them. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1325) It was discovered that the CImg library did not correctly handle certain memory operations, which could lead to a buffer overflow. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-26540) Update Instructions: Run `sudo pro fix USN-7437-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cimg-dev - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 cimg-doc - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 cimg-examples - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-1325
CVE-2024-26540
USN-7438-1 -- 7-Zip vulnerabilities
Ubuntu 24.04 LTS
Igor Pavlov discovered that 7-Zip had several memory-related issues. An attacker could possibly use these issues to cause 7-Zip to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-52168, CVE-2023-52169) Update Instructions: Run `sudo pro fix USN-7438-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: 7zip - 23.01+dfsg-11ubuntu0.1~esm1 7zip-standalone - 23.01+dfsg-11ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-52168
CVE-2023-52169
USN-7439-1 -- QuickJS vulnerabilities
Ubuntu 24.04 LTS
It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use this issue to cause QuickJS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-48183) It was discovered that QuickJS incorrectly managed memory in certain circumstances. An attacker could possibly use this issue to exhaust system resources, resulting in a denial of service. (CVE-2023-48184) It was discovered that QuickJS could be forced to crash due to a failing test. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-33263) Update Instructions: Run `sudo pro fix USN-7439-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libquickjs - 2021.03.27-1ubuntu0.1~esm1 quickjs - 2021.03.27-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-48183
CVE-2023-48184
CVE-2024-33263
USN-7441-1 -- Eclipse Mosquitto vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Eclipse Mosquitto client incorrectly handled memory when receiving a SUBACK packet. An attacker with a malicious broker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-10525) Xiangpu Song discovered that Eclipse Mosquitto broker did not properly manage memory under certain circumstances. A malicious client with a remote connection could possibly use this issue to cause the broker to crash resulting in a denial of service, or another unspecified impact. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3935) Update Instructions: Run `sudo pro fix USN-7441-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmosquitto-dev - 2.0.18-1ubuntu0.1~esm1 libmosquitto1 - 2.0.18-1ubuntu0.1~esm1 libmosquittopp-dev - 2.0.18-1ubuntu0.1~esm1 libmosquittopp1 - 2.0.18-1ubuntu0.1~esm1 mosquitto - 2.0.18-1ubuntu0.1~esm1 mosquitto-clients - 2.0.18-1ubuntu0.1~esm1 mosquitto-dev - 2.0.18-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-10525
CVE-2024-3935
USN-7443-1 -- Erlang vulnerability
Ubuntu 24.04 LTS
Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, and Jörg Schwenk discovered that Erlang OTP’s SSH module incorrect handled authentication. A remote attacker could use this issue to execute arbitrary commands without authentication, possibly leading to a system compromise. Update Instructions: Run `sudo pro fix USN-7443-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.3 No subscription required
High
CVE-2025-32433
USN-7445-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21685, CVE-2025-21684, CVE-2025-21756, CVE-2025-21670, CVE-2024-57949, CVE-2025-21677, CVE-2025-21680, CVE-2025-21703, CVE-2024-57952, CVE-2025-21674, CVE-2025-21701, CVE-2025-21691, CVE-2025-21689, CVE-2025-21668, CVE-2025-21665, CVE-2025-21683, CVE-2025-21675, CVE-2025-21672, CVE-2024-57948, CVE-2025-21669, CVE-2025-21673, CVE-2025-21692, CVE-2025-21699, CVE-2025-21702, CVE-2025-21682, CVE-2025-21690, CVE-2025-21681, CVE-2025-21695, CVE-2025-21696, CVE-2025-21700, CVE-2025-21678, CVE-2025-21676, CVE-2024-57950, CVE-2025-21666, CVE-2025-21694, CVE-2025-21693, CVE-2025-21993, CVE-2024-57951, CVE-2025-21697, CVE-2025-21667) Update Instructions: Run `sudo pro fix USN-7445-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-buildinfo-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-cloud-tools-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-headers-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-headers-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-image-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-unsigned-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-image-unsigned-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-modules-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-modules-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-tools-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-tools-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 No subscription required linux-buildinfo-6.11.0-1020-oem - 6.11.0-1020.20 linux-headers-6.11.0-1020-oem - 6.11.0-1020.20 linux-headers-oem-24.04b - 6.11.0-1020.20 linux-image-6.11.0-1020-oem - 6.11.0-1020.20 linux-image-oem-24.04b - 6.11.0-1020.20 linux-image-uc-6.11.0-1020-oem - 6.11.0-1020.20 linux-image-uc-oem-24.04b - 6.11.0-1020.20 linux-image-unsigned-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu6-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu6-oem-24.04b - 6.11.0-1020.20 linux-modules-ipu7-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu7-oem-24.04b - 6.11.0-1020.20 linux-modules-iwlwifi-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1020.20 linux-modules-usbio-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-usbio-oem-24.04b - 6.11.0-1020.20 linux-modules-vision-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-vision-oem-24.04b - 6.11.0-1020.20 linux-oem-24.04b - 6.11.0-1020.20 linux-oem-6.11-headers-6.11.0-1020 - 6.11.0-1020.20 linux-oem-6.11-tools-6.11.0-1020 - 6.11.0-1020.20 linux-tools-6.11.0-1020-oem - 6.11.0-1020.20 linux-tools-oem-24.04b - 6.11.0-1020.20 No subscription required linux-buildinfo-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-buildinfo-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-cloud-tools-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-headers-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-hwe-6.11-headers-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-hwe-6.11-tools-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-image-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-uc-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-uc-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-unsigned-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-unsigned-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-modules-extra-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu6-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-ipu7-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-usbio-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-vision-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-tools-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 No subscription required
Medium
CVE-2024-57948
CVE-2024-57949
CVE-2024-57950
CVE-2024-57951
CVE-2024-57952
CVE-2025-21665
CVE-2025-21666
CVE-2025-21667
CVE-2025-21668
CVE-2025-21669
CVE-2025-21670
CVE-2025-21672
CVE-2025-21673
CVE-2025-21674
CVE-2025-21675
CVE-2025-21676
CVE-2025-21677
CVE-2025-21678
CVE-2025-21680
CVE-2025-21681
CVE-2025-21682
CVE-2025-21683
CVE-2025-21684
CVE-2025-21685
CVE-2025-21689
CVE-2025-21690
CVE-2025-21691
CVE-2025-21692
CVE-2025-21693
CVE-2025-21694
CVE-2025-21695
CVE-2025-21696
CVE-2025-21697
CVE-2025-21699
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21703
CVE-2025-21756
CVE-2025-21993
USN-7446-1 -- mod_auth_openidc vulnerability
Ubuntu 24.04 LTS
It was discovered that mod_auth_openidc incorrectly handled certain POST requests. An attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7446-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-auth-openidc - 2.4.15.1-1ubuntu0.1 No subscription required
Medium
CVE-2025-31492
USN-7447-1 -- Yelp vulnerability
Ubuntu 24.04 LTS
It was discovered that Yelp incorrectly handled paths in ghelp URLs. A remote attacker could use this issue to trick users into opening malicious downloaded help files and exfiltrate sensitive information. Update Instructions: Run `sudo pro fix USN-7447-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: yelp-xsl - 42.1-2ubuntu0.24.04.1 No subscription required libyelp-dev - 42.2-1ubuntu0.24.04.1 libyelp0 - 42.2-1ubuntu0.24.04.1 yelp - 42.2-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-3155
USN-7448-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21694, CVE-2025-21993, CVE-2025-21684, CVE-2025-21681, CVE-2025-21675, CVE-2025-21672, CVE-2025-21696, CVE-2025-21691, CVE-2025-21683, CVE-2025-21666, CVE-2025-21682, CVE-2025-21697, CVE-2025-21668, CVE-2025-21701, CVE-2025-21670, CVE-2025-21676, CVE-2025-21695, CVE-2025-21692, CVE-2025-21674, CVE-2025-21699, CVE-2024-57948, CVE-2025-21677, CVE-2024-57951, CVE-2025-21702, CVE-2025-21700, CVE-2024-57949, CVE-2025-21669, CVE-2025-21703, CVE-2025-21756, CVE-2025-21667, CVE-2024-57952, CVE-2024-57950, CVE-2025-21685, CVE-2025-21693, CVE-2025-21678, CVE-2025-21665, CVE-2025-21680, CVE-2025-21689, CVE-2025-21690, CVE-2025-21673) Update Instructions: Run `sudo pro fix USN-7448-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1013.13~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-6.11-headers-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-6.11-tools-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-edge - 6.11.0-1013.13~24.04.1 linux-azure-fde - 6.11.0-1013.13~24.04.1 linux-azure-fde-edge - 6.11.0-1013.13~24.04.1 linux-buildinfo-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1013.13~24.04.1 linux-headers-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-headers-azure - 6.11.0-1013.13~24.04.1 linux-headers-azure-edge - 6.11.0-1013.13~24.04.1 linux-image-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-image-6.11.0-1013-azure-fde - 6.11.0-1013.13~24.04.1 linux-image-azure - 6.11.0-1013.13~24.04.1 linux-image-azure-edge - 6.11.0-1013.13~24.04.1 linux-image-azure-fde - 6.11.0-1013.13~24.04.1 linux-image-azure-fde-edge - 6.11.0-1013.13~24.04.1 linux-image-unsigned-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1013.13~24.04.1 linux-tools-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-tools-azure - 6.11.0-1013.13~24.04.1 linux-tools-azure-edge - 6.11.0-1013.13~24.04.1 No subscription required
Medium
CVE-2024-57948
CVE-2024-57949
CVE-2024-57950
CVE-2024-57951
CVE-2024-57952
CVE-2025-21665
CVE-2025-21666
CVE-2025-21667
CVE-2025-21668
CVE-2025-21669
CVE-2025-21670
CVE-2025-21672
CVE-2025-21673
CVE-2025-21674
CVE-2025-21675
CVE-2025-21676
CVE-2025-21677
CVE-2025-21678
CVE-2025-21680
CVE-2025-21681
CVE-2025-21682
CVE-2025-21683
CVE-2025-21684
CVE-2025-21685
CVE-2025-21689
CVE-2025-21690
CVE-2025-21691
CVE-2025-21692
CVE-2025-21693
CVE-2025-21694
CVE-2025-21695
CVE-2025-21696
CVE-2025-21697
CVE-2025-21699
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21703
CVE-2025-21756
CVE-2025-21993
CVE-2025-2312
USN-7449-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50288, CVE-2024-56568, CVE-2024-50280, CVE-2024-56677, CVE-2024-56620, CVE-2024-53108, CVE-2024-53115, CVE-2024-53061, CVE-2024-53215, CVE-2024-50275, CVE-2024-53133, CVE-2024-50279, CVE-2025-21831, CVE-2025-21756, CVE-2024-56727, CVE-2024-50208, CVE-2024-50142, CVE-2024-53148, CVE-2024-56781, CVE-2024-53171, CVE-2024-56608, CVE-2024-53177, CVE-2024-56708, CVE-2024-50207, CVE-2024-50278, CVE-2024-50166, CVE-2024-56629, CVE-2024-56723, CVE-2024-50172, CVE-2024-56707, CVE-2024-50051, CVE-2024-56606, CVE-2024-56700, CVE-2024-56599, CVE-2024-53051, CVE-2024-56632, CVE-2024-47143, CVE-2024-53135, CVE-2024-53111, CVE-2024-56634, CVE-2024-50262, CVE-2024-56587, CVE-2024-50125, CVE-2024-53145, CVE-2024-53185, CVE-2024-56575, CVE-2024-53231, CVE-2024-53072, CVE-2024-50110, CVE-2024-53172, CVE-2024-50258, CVE-2024-53226, CVE-2024-50211, CVE-2024-43098, CVE-2024-50224, CVE-2024-56642, CVE-2024-53082, CVE-2024-50108, CVE-2024-53094, CVE-2024-53184, CVE-2024-56648, CVE-2024-50140, CVE-2024-53166, CVE-2024-53090, CVE-2024-50301, CVE-2024-56625, CVE-2024-50230, CVE-2024-56586, CVE-2024-53052, CVE-2024-56574, CVE-2024-53168, CVE-2024-53209, CVE-2024-56640, CVE-2024-49899, CVE-2024-50247, CVE-2024-50150, CVE-2024-53058, CVE-2024-50153, CVE-2024-56689, CVE-2024-50283, CVE-2024-50251, CVE-2024-56578, CVE-2024-50303, CVE-2024-56569, CVE-2024-53134, CVE-2024-50158, CVE-2024-56592, CVE-2024-50300, CVE-2024-57838, CVE-2024-50205, CVE-2024-56562, CVE-2024-57843, CVE-2024-53084, CVE-2024-56532, CVE-2024-50127, CVE-2024-56584, CVE-2024-53196, CVE-2024-56722, CVE-2024-50215, CVE-2022-49034, CVE-2024-47809, CVE-2024-56744, CVE-2024-50121, CVE-2024-53083, CVE-2024-56540, CVE-2024-50209, CVE-2024-56787, CVE-2024-48873, CVE-2024-53221, CVE-2024-56746, CVE-2024-50238, CVE-2024-50226, CVE-2024-52332, CVE-2024-56649, CVE-2024-56546, CVE-2024-53223, CVE-2024-50259, CVE-2024-50287, CVE-2024-56701, CVE-2024-56692, CVE-2024-50243, CVE-2024-53160, CVE-2024-56619, CVE-2024-50128, CVE-2024-53173, CVE-2024-53127, CVE-2024-56720, CVE-2024-56633, CVE-2024-48875, CVE-2024-56775, CVE-2024-50155, CVE-2024-56611, CVE-2024-56539, CVE-2024-50282, CVE-2024-56600, CVE-2024-53110, CVE-2024-50111, CVE-2024-56773, CVE-2024-53161, CVE-2024-56615, CVE-2024-56786, CVE-2024-56783, CVE-2024-56645, CVE-2024-50216, CVE-2024-56605, CVE-2024-56622, CVE-2024-56613, CVE-2024-50245, CVE-2024-50240, CVE-2024-53222, CVE-2024-53203, CVE-2024-53042, CVE-2024-56724, CVE-2024-57876, CVE-2024-49906, CVE-2024-56596, CVE-2024-50234, CVE-2024-41014, CVE-2024-53053, CVE-2024-48881, CVE-2024-56601, CVE-2024-56581, CVE-2024-56609, CVE-2024-56576, CVE-2024-53044, CVE-2024-53680, CVE-2024-50170, CVE-2024-50116, CVE-2024-56705, CVE-2024-53138, CVE-2024-53162, CVE-2024-50136, CVE-2024-53210, CVE-2024-50167, CVE-2024-50292, CVE-2024-53067, CVE-2024-53101, CVE-2024-56691, CVE-2024-53200, CVE-2024-50255, CVE-2024-53142, CVE-2025-21700, CVE-2024-50104, CVE-2024-56687, CVE-2024-50163, CVE-2024-56756, CVE-2024-50218, CVE-2024-56550, CVE-2024-53202, CVE-2024-50137, CVE-2024-50270, CVE-2024-56641, CVE-2024-53154, CVE-2024-53224, CVE-2024-53155, CVE-2024-50124, CVE-2024-41935, CVE-2024-50265, CVE-2024-53190, CVE-2024-50256, CVE-2024-53234, CVE-2024-56693, CVE-2024-50143, CVE-2024-53181, CVE-2024-50154, CVE-2024-53233, CVE-2024-56771, CVE-2024-53236, CVE-2024-53227, CVE-2024-56572, CVE-2024-53126, CVE-2024-56551, CVE-2024-50299, CVE-2024-53218, CVE-2024-50135, CVE-2024-53188, CVE-2024-56635, CVE-2024-53055, CVE-2024-56751, CVE-2024-56577, CVE-2024-50289, CVE-2024-56590, CVE-2024-56745, CVE-2024-53176, CVE-2024-56681, CVE-2024-50160, CVE-2024-56557, CVE-2024-53213, CVE-2024-50267, CVE-2024-50146, CVE-2024-56627, CVE-2024-50290, CVE-2024-56565, CVE-2024-56752, CVE-2024-56603, CVE-2024-50246, CVE-2024-56690, CVE-2024-50222, CVE-2024-53087, CVE-2024-53091, CVE-2024-50115, CVE-2024-53106, CVE-2024-50250, CVE-2024-50242, CVE-2024-50248, CVE-2024-53229, CVE-2024-56588, CVE-2024-56785, CVE-2024-53195, CVE-2025-21702, CVE-2024-53059, CVE-2024-50107, CVE-2024-50139, CVE-2024-50276, CVE-2024-56543, CVE-2024-53228, CVE-2024-50232, CVE-2024-53128, CVE-2024-56651, CVE-2024-53047, CVE-2024-56726, CVE-2024-50159, CVE-2024-50231, CVE-2024-56545, CVE-2024-56778, CVE-2024-56602, CVE-2024-50221, CVE-2024-56754, CVE-2024-56704, CVE-2024-56650, CVE-2024-57850, CVE-2024-50206, CVE-2024-56573, CVE-2024-56703, CVE-2024-53208, CVE-2024-53158, CVE-2024-50274, CVE-2024-56638, CVE-2024-50151, CVE-2024-53239, CVE-2024-56742, CVE-2024-50237, CVE-2024-53066, CVE-2024-56580, CVE-2024-56688, CVE-2024-53089, CVE-2024-56777, CVE-2024-50138, CVE-2024-53198, CVE-2024-56589, CVE-2024-56694, CVE-2024-50261, CVE-2024-53147, CVE-2024-50263, CVE-2024-56644, CVE-2024-56597, CVE-2024-53197, CVE-2024-50164, CVE-2024-53191, CVE-2024-56549, CVE-2024-50284, CVE-2024-57849, CVE-2024-56594, CVE-2024-56782, CVE-2024-50235, CVE-2024-49569, CVE-2024-53237, CVE-2024-56643, CVE-2024-53109, CVE-2024-53157, CVE-2024-56637, CVE-2024-56623, CVE-2024-56683, CVE-2024-50257, CVE-2024-56765, CVE-2024-53201, CVE-2024-53050, CVE-2024-53120, CVE-2024-53121, CVE-2024-50126, CVE-2024-56774, CVE-2024-53219, CVE-2024-56616, CVE-2024-50223, CVE-2024-41932, CVE-2024-50271, CVE-2024-56593, CVE-2024-50285, CVE-2024-53113, CVE-2025-21993, CVE-2024-56607, CVE-2024-50252, CVE-2024-56610, CVE-2024-53043, CVE-2024-50120, CVE-2024-44955, CVE-2024-50118, CVE-2024-53130, CVE-2024-56566, CVE-2024-53146, CVE-2024-56721, CVE-2024-53079, CVE-2024-56685, CVE-2024-50145, CVE-2024-56755, CVE-2024-50268, CVE-2024-53046, CVE-2024-50010, CVE-2024-56531, CVE-2024-53129, CVE-2024-47794, CVE-2024-53119, CVE-2024-50297, CVE-2024-56728, CVE-2025-21701, CVE-2024-53163, CVE-2024-56739, CVE-2024-56538, CVE-2024-50294, CVE-2024-53183, CVE-2024-53131, CVE-2024-56626, CVE-2024-50133, CVE-2024-53151, CVE-2024-56679, CVE-2024-50225, CVE-2024-50152, CVE-2024-53174, CVE-2024-56698, CVE-2024-53105, CVE-2024-53085, CVE-2024-53220, CVE-2024-53180, CVE-2024-53060, CVE-2024-53139, CVE-2024-56631, CVE-2024-53175, CVE-2024-57872, CVE-2024-56779, CVE-2024-50220, CVE-2024-50169, CVE-2024-56772, CVE-2024-53230, CVE-2024-53122, CVE-2024-50067, CVE-2024-56558, CVE-2024-45828, CVE-2024-57874, CVE-2024-50239, CVE-2024-53214, CVE-2024-56621, CVE-2024-50156, CVE-2024-56583, CVE-2024-56776, CVE-2024-50298, CVE-2024-56533, CVE-2024-56748, CVE-2024-53114, CVE-2024-53187, CVE-2024-50269, CVE-2024-50286, CVE-2024-56579, CVE-2024-56548, CVE-2024-50210, CVE-2024-50244, CVE-2024-50291, CVE-2024-56567, CVE-2024-56780, CVE-2024-53150, CVE-2024-56636, CVE-2024-56561, CVE-2024-53194, CVE-2024-53093, CVE-2024-53117, CVE-2024-53062, CVE-2024-53123, CVE-2024-50236, CVE-2024-56630, CVE-2024-56678, CVE-2024-48876, CVE-2024-50249, CVE-2024-53099, CVE-2024-53048, CVE-2024-50296, CVE-2024-50131, CVE-2024-50105, CVE-2024-50141, CVE-2024-56729, CVE-2024-53217, CVE-2024-50295, CVE-2024-50130, CVE-2024-56725, CVE-2024-42122, CVE-2024-56570, CVE-2024-53118, CVE-2024-50112, CVE-2024-50203, CVE-2024-53178, CVE-2024-53068, CVE-2024-50272, CVE-2024-53232, CVE-2024-53088, CVE-2024-56647, CVE-2024-53076, CVE-2024-53100, CVE-2024-53096, CVE-2024-56747, CVE-2024-53045, CVE-2024-53086, CVE-2024-50147, CVE-2024-53081, CVE-2024-50273, CVE-2024-50103, CVE-2024-53107, CVE-2024-53095, CVE-2024-47141, CVE-2024-56604, CVE-2024-50304, CVE-2024-53169, CVE-2024-50162, CVE-2024-53112) Update Instructions: Run `sudo pro fix USN-7449-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-ibm - 6.8.0-1024.24 linux-headers-6.8.0-1024-ibm - 6.8.0-1024.24 linux-headers-ibm - 6.8.0-1024.24 linux-headers-ibm-classic - 6.8.0-1024.24 linux-headers-ibm-lts-24.04 - 6.8.0-1024.24 linux-ibm - 6.8.0-1024.24 linux-ibm-classic - 6.8.0-1024.24 linux-ibm-headers-6.8.0-1024 - 6.8.0-1024.24 linux-ibm-lts-24.04 - 6.8.0-1024.24 linux-ibm-tools-6.8.0-1024 - 6.8.0-1024.24 linux-image-6.8.0-1024-ibm - 6.8.0-1024.24 linux-image-ibm - 6.8.0-1024.24 linux-image-ibm-classic - 6.8.0-1024.24 linux-image-ibm-lts-24.04 - 6.8.0-1024.24 linux-image-unsigned-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-extra-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-ibm-classic - 6.8.0-1024.24 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1024.24 linux-tools-6.8.0-1024-ibm - 6.8.0-1024.24 linux-tools-ibm - 6.8.0-1024.24 linux-tools-ibm-classic - 6.8.0-1024.24 linux-tools-ibm-lts-24.04 - 6.8.0-1024.24 No subscription required linux-buildinfo-6.8.0-1024-oracle - 6.8.0-1024.25 linux-buildinfo-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-headers-6.8.0-1024-oracle - 6.8.0-1024.25 linux-headers-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-headers-oracle - 6.8.0-1024.25 linux-headers-oracle-64k - 6.8.0-1024.25 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-headers-oracle-lts-24.04 - 6.8.0-1024.25 linux-image-6.8.0-1024-oracle - 6.8.0-1024.25 linux-image-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-image-oracle - 6.8.0-1024.25 linux-image-oracle-64k - 6.8.0-1024.25 linux-image-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-image-oracle-lts-24.04 - 6.8.0-1024.25 linux-image-unsigned-6.8.0-1024-oracle - 6.8.0-1024.25 linux-image-unsigned-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-modules-6.8.0-1024-oracle - 6.8.0-1024.25 linux-modules-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-modules-extra-6.8.0-1024-oracle - 6.8.0-1024.25 linux-modules-extra-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-oracle - 6.8.0-1024.25 linux-oracle-64k - 6.8.0-1024.25 linux-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-oracle-headers-6.8.0-1024 - 6.8.0-1024.25 linux-oracle-lts-24.04 - 6.8.0-1024.25 linux-oracle-tools-6.8.0-1024 - 6.8.0-1024.25 linux-tools-6.8.0-1024-oracle - 6.8.0-1024.25 linux-tools-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-tools-oracle - 6.8.0-1024.25 linux-tools-oracle-64k - 6.8.0-1024.25 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-tools-oracle-lts-24.04 - 6.8.0-1024.25 No subscription required linux-buildinfo-6.8.0-1026-oem - 6.8.0-1026.26 linux-headers-6.8.0-1026-oem - 6.8.0-1026.26 linux-headers-oem-24.04 - 6.8.0-1026.26 linux-headers-oem-24.04a - 6.8.0-1026.26 linux-image-6.8.0-1026-oem - 6.8.0-1026.26 linux-image-oem-24.04 - 6.8.0-1026.26 linux-image-oem-24.04a - 6.8.0-1026.26 linux-image-uc-6.8.0-1026-oem - 6.8.0-1026.26 linux-image-uc-oem-24.04 - 6.8.0-1026.26 linux-image-uc-oem-24.04a - 6.8.0-1026.26 linux-image-unsigned-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-ipu6-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-ipu6-oem-24.04 - 6.8.0-1026.26 linux-modules-ipu6-oem-24.04a - 6.8.0-1026.26 linux-modules-iwlwifi-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1026.26 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1026.26 linux-modules-usbio-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-usbio-oem-24.04 - 6.8.0-1026.26 linux-modules-usbio-oem-24.04a - 6.8.0-1026.26 linux-oem-24.04 - 6.8.0-1026.26 linux-oem-24.04a - 6.8.0-1026.26 linux-oem-6.8-headers-6.8.0-1026 - 6.8.0-1026.26 linux-oem-6.8-tools-6.8.0-1026 - 6.8.0-1026.26 linux-tools-6.8.0-1026-oem - 6.8.0-1026.26 linux-tools-oem-24.04 - 6.8.0-1026.26 linux-tools-oem-24.04a - 6.8.0-1026.26 No subscription required linux-buildinfo-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-buildinfo-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-cloud-tools-nvidia - 6.8.0-1026.29 linux-headers-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-headers-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-headers-nvidia - 6.8.0-1026.29 linux-headers-nvidia-64k - 6.8.0-1026.29 linux-image-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-image-nvidia - 6.8.0-1026.29 linux-image-nvidia-64k - 6.8.0-1026.29 linux-image-uc-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-uc-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-image-unsigned-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-unsigned-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-extra-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-nvidia-fs-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1026.29 linux-nvidia - 6.8.0-1026.29 linux-nvidia-64k - 6.8.0-1026.29 linux-nvidia-headers-6.8.0-1026 - 6.8.0-1026.29 linux-nvidia-tools-6.8.0-1026 - 6.8.0-1026.29 linux-tools-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-tools-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-tools-nvidia - 6.8.0-1026.29 linux-tools-nvidia-64k - 6.8.0-1026.29 No subscription required linux-buildinfo-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-buildinfo-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-headers-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-uc-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-uc-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-unsigned-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-unsigned-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-extra-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-nvidia-lowlatency - 6.8.0-1026.29.1 linux-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-nvidia-lowlatency-headers-6.8.0-1026 - 6.8.0-1026.29.1 linux-nvidia-lowlatency-tools-6.8.0-1026 - 6.8.0-1026.29.1 linux-tools-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-tools-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-tools-nvidia-lowlatency - 6.8.0-1026.29.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1026.29.1 No subscription required linux-aws - 6.8.0-1027.29 linux-aws-cloud-tools-6.8.0-1027 - 6.8.0-1027.29 linux-aws-headers-6.8.0-1027 - 6.8.0-1027.29 linux-aws-lts-24.04 - 6.8.0-1027.29 linux-aws-tools-6.8.0-1027 - 6.8.0-1027.29 linux-buildinfo-6.8.0-1027-aws - 6.8.0-1027.29 linux-cloud-tools-6.8.0-1027-aws - 6.8.0-1027.29 linux-headers-6.8.0-1027-aws - 6.8.0-1027.29 linux-headers-aws - 6.8.0-1027.29 linux-headers-aws-lts-24.04 - 6.8.0-1027.29 linux-image-6.8.0-1027-aws - 6.8.0-1027.29 linux-image-aws - 6.8.0-1027.29 linux-image-aws-lts-24.04 - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-extra-aws - 6.8.0-1027.29 linux-modules-extra-aws-lts-24.04 - 6.8.0-1027.29 linux-tools-6.8.0-1027-aws - 6.8.0-1027.29 linux-tools-aws - 6.8.0-1027.29 linux-tools-aws-lts-24.04 - 6.8.0-1027.29 No subscription required linux-azure-cloud-tools-6.8.0-1027 - 6.8.0-1027.32 linux-azure-fde-lts-24.04 - 6.8.0-1027.32 linux-azure-headers-6.8.0-1027 - 6.8.0-1027.32 linux-azure-lts-24.04 - 6.8.0-1027.32 linux-azure-tools-6.8.0-1027 - 6.8.0-1027.32 linux-buildinfo-6.8.0-1027-azure - 6.8.0-1027.32 linux-cloud-tools-6.8.0-1027-azure - 6.8.0-1027.32 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1027.32 linux-headers-6.8.0-1027-azure - 6.8.0-1027.32 linux-headers-azure-lts-24.04 - 6.8.0-1027.32 linux-image-6.8.0-1027-azure - 6.8.0-1027.32 linux-image-6.8.0-1027-azure-fde - 6.8.0-1027.32 linux-image-azure-fde-lts-24.04 - 6.8.0-1027.32 linux-image-azure-lts-24.04 - 6.8.0-1027.32 linux-image-unsigned-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-extra-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-extra-azure-lts-24.04 - 6.8.0-1027.32 linux-modules-involflt-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1027.32 linux-modules-iwlwifi-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1027.32 linux-tools-6.8.0-1027-azure - 6.8.0-1027.32 linux-tools-azure-lts-24.04 - 6.8.0-1027.32 No subscription required linux-bpf-dev - 6.8.0-58.60 linux-buildinfo-6.8.0-58-generic - 6.8.0-58.60 linux-buildinfo-6.8.0-58-generic-64k - 6.8.0-58.60 linux-cloud-tools-6.8.0-58 - 6.8.0-58.60 linux-cloud-tools-6.8.0-58-generic - 6.8.0-58.60 linux-cloud-tools-common - 6.8.0-58.60 linux-cloud-tools-generic - 6.8.0-58.60 linux-cloud-tools-virtual - 6.8.0-58.60 linux-crashdump - 6.8.0-58.60 linux-doc - 6.8.0-58.60 linux-generic - 6.8.0-58.60 linux-generic-64k - 6.8.0-58.60 linux-generic-lpae - 6.8.0-58.60 linux-headers-6.8.0-58 - 6.8.0-58.60 linux-headers-6.8.0-58-generic - 6.8.0-58.60 linux-headers-6.8.0-58-generic-64k - 6.8.0-58.60 linux-headers-generic - 6.8.0-58.60 linux-headers-generic-64k - 6.8.0-58.60 linux-headers-generic-lpae - 6.8.0-58.60 linux-headers-kvm - 6.8.0-58.60 linux-headers-laptop-23.10 - 6.8.0-58.60 linux-headers-oem-20.04 - 6.8.0-58.60 linux-headers-oem-20.04b - 6.8.0-58.60 linux-headers-oem-20.04c - 6.8.0-58.60 linux-headers-oem-20.04d - 6.8.0-58.60 linux-headers-oem-22.04 - 6.8.0-58.60 linux-headers-virtual - 6.8.0-58.60 linux-image-extra-virtual - 6.8.0-58.60 linux-image-generic - 6.8.0-58.60 linux-image-generic-64k - 6.8.0-58.60 linux-image-generic-lpae - 6.8.0-58.60 linux-image-kvm - 6.8.0-58.60 linux-image-laptop-23.10 - 6.8.0-58.60 linux-image-oem-20.04 - 6.8.0-58.60 linux-image-oem-20.04b - 6.8.0-58.60 linux-image-oem-20.04c - 6.8.0-58.60 linux-image-oem-20.04d - 6.8.0-58.60 linux-image-oem-22.04 - 6.8.0-58.60 linux-image-uc-generic - 6.8.0-58.60 linux-image-unsigned-6.8.0-58-generic - 6.8.0-58.60 linux-image-unsigned-6.8.0-58-generic-64k - 6.8.0-58.60 linux-image-virtual - 6.8.0-58.60 linux-kvm - 6.8.0-58.60 linux-laptop-23.10 - 6.8.0-58.60 linux-lib-rust-6.8.0-58-generic - 6.8.0-58.60 linux-libc-dev - 6.8.0-58.60 linux-modules-6.8.0-58-generic - 6.8.0-58.60 linux-modules-6.8.0-58-generic-64k - 6.8.0-58.60 linux-modules-extra-6.8.0-58-generic - 6.8.0-58.60 linux-modules-ipu6-6.8.0-58-generic - 6.8.0-58.60 linux-modules-ipu6-generic - 6.8.0-58.60 linux-modules-iwlwifi-6.8.0-58-generic - 6.8.0-58.60 linux-modules-iwlwifi-generic - 6.8.0-58.60 linux-modules-iwlwifi-oem-20.04 - 6.8.0-58.60 linux-modules-iwlwifi-oem-20.04d - 6.8.0-58.60 linux-modules-iwlwifi-oem-22.04 - 6.8.0-58.60 linux-modules-usbio-6.8.0-58-generic - 6.8.0-58.60 linux-modules-usbio-generic - 6.8.0-58.60 linux-oem-20.04 - 6.8.0-58.60 linux-oem-20.04b - 6.8.0-58.60 linux-oem-20.04c - 6.8.0-58.60 linux-oem-20.04d - 6.8.0-58.60 linux-oem-22.04 - 6.8.0-58.60 linux-source - 6.8.0-58.60 linux-source-6.8.0 - 6.8.0-58.60 linux-tools-6.8.0-58 - 6.8.0-58.60 linux-tools-6.8.0-58-generic - 6.8.0-58.60 linux-tools-6.8.0-58-generic-64k - 6.8.0-58.60 linux-tools-common - 6.8.0-58.60 linux-tools-generic - 6.8.0-58.60 linux-tools-generic-64k - 6.8.0-58.60 linux-tools-generic-lpae - 6.8.0-58.60 linux-tools-host - 6.8.0-58.60 linux-tools-kvm - 6.8.0-58.60 linux-tools-laptop-23.10 - 6.8.0-58.60 linux-tools-oem-20.04 - 6.8.0-58.60 linux-tools-oem-20.04b - 6.8.0-58.60 linux-tools-oem-20.04c - 6.8.0-58.60 linux-tools-oem-20.04d - 6.8.0-58.60 linux-tools-oem-22.04 - 6.8.0-58.60 linux-tools-virtual - 6.8.0-58.60 linux-virtual - 6.8.0-58.60 No subscription required linux-image-6.8.0-58-generic - 6.8.0-58.60+1 linux-image-6.8.0-58-generic-64k - 6.8.0-58.60+1 linux-image-uc-6.8.0-58-generic - 6.8.0-58.60+1 linux-image-uc-6.8.0-58-generic-64k - 6.8.0-58.60+1 No subscription required linux-buildinfo-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-buildinfo-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-cloud-tools-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-cloud-tools-lowlatency - 6.8.0-58.60.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-headers-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-headers-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-headers-lowlatency - 6.8.0-58.60.1 linux-headers-lowlatency-64k - 6.8.0-58.60.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-image-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-image-lowlatency - 6.8.0-58.60.1 linux-image-lowlatency-64k - 6.8.0-58.60.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-unsigned-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-image-unsigned-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-lowlatency - 6.8.0-58.60.1 linux-lowlatency-64k - 6.8.0-58.60.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-lowlatency-cloud-tools-6.8.0-58 - 6.8.0-58.60.1 linux-lowlatency-headers-6.8.0-58 - 6.8.0-58.60.1 linux-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-lowlatency-lib-rust-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-lowlatency-tools-6.8.0-58 - 6.8.0-58.60.1 linux-modules-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-modules-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-modules-iwlwifi-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-modules-iwlwifi-lowlatency - 6.8.0-58.60.1 linux-tools-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-tools-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-tools-lowlatency - 6.8.0-58.60.1 linux-tools-lowlatency-64k - 6.8.0-58.60.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 No subscription required
High
CVE-2022-49034
CVE-2024-41014
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49569
CVE-2024-49899
CVE-2024-49906
CVE-2024-50010
CVE-2024-50051
CVE-2024-50067
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50169
CVE-2024-50170
CVE-2024-50172
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50210
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50249
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53060
CVE-2024-53061
CVE-2024-53062
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53142
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53185
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53201
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56561
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56596
CVE-2024-56597
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56765
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57838
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21993
USN-7450-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50051, CVE-2024-56546, CVE-2024-56551, CVE-2024-53236, CVE-2024-50244, CVE-2024-53043, CVE-2024-56694, CVE-2025-21700, CVE-2024-56700, CVE-2025-21993, CVE-2024-53224, CVE-2024-50105, CVE-2024-53100, CVE-2024-56690, CVE-2024-50150, CVE-2024-53223, CVE-2024-50285, CVE-2024-50269, CVE-2024-53089, CVE-2024-53044, CVE-2024-53175, CVE-2024-57849, CVE-2024-50296, CVE-2024-50120, CVE-2024-50147, CVE-2024-56540, CVE-2024-56602, CVE-2024-50289, CVE-2024-53127, CVE-2024-56786, CVE-2024-50108, CVE-2024-53045, CVE-2024-53067, CVE-2024-50138, CVE-2024-53173, CVE-2024-50143, CVE-2024-56678, CVE-2024-53130, CVE-2024-53157, CVE-2024-56723, CVE-2024-56623, CVE-2024-53234, CVE-2024-53088, CVE-2024-53068, CVE-2024-53195, CVE-2024-53188, CVE-2024-56613, CVE-2024-56561, CVE-2024-53218, CVE-2024-50215, CVE-2024-53227, CVE-2024-50139, CVE-2024-50170, CVE-2024-56640, CVE-2024-56720, CVE-2024-56780, CVE-2024-56705, CVE-2024-53131, CVE-2024-56597, CVE-2024-50224, CVE-2024-57843, CVE-2024-50251, CVE-2024-50243, CVE-2024-53200, CVE-2024-50280, CVE-2024-50303, CVE-2024-50107, CVE-2024-56606, CVE-2024-53237, CVE-2024-53161, CVE-2024-56685, CVE-2024-53185, CVE-2024-56785, CVE-2024-53150, CVE-2024-53166, CVE-2024-50141, CVE-2024-50158, CVE-2024-47143, CVE-2024-56773, CVE-2024-53090, CVE-2024-56778, CVE-2024-50142, CVE-2025-21701, CVE-2024-50301, CVE-2024-53050, CVE-2024-50211, CVE-2024-50246, CVE-2024-50252, CVE-2024-53122, CVE-2024-53085, CVE-2024-50104, CVE-2024-50288, CVE-2024-53151, CVE-2024-56728, CVE-2024-53086, CVE-2024-56568, CVE-2024-53133, CVE-2024-50290, CVE-2024-56774, CVE-2024-50278, CVE-2024-56565, CVE-2024-53147, CVE-2024-56775, CVE-2024-53239, CVE-2024-56533, CVE-2024-50225, CVE-2024-50124, CVE-2024-47794, CVE-2024-50163, CVE-2024-53680, CVE-2024-56574, CVE-2024-56605, CVE-2024-50112, CVE-2024-53221, CVE-2024-56751, CVE-2024-56538, CVE-2024-53123, CVE-2024-56688, CVE-2024-50239, CVE-2024-56742, CVE-2024-56752, CVE-2024-53059, CVE-2024-50282, CVE-2024-50238, CVE-2024-53108, CVE-2024-50152, CVE-2024-53214, CVE-2024-53226, CVE-2024-50292, CVE-2024-56580, CVE-2024-56621, CVE-2024-56593, CVE-2024-56689, CVE-2024-56649, CVE-2024-56650, CVE-2024-53203, CVE-2024-56626, CVE-2025-21831, CVE-2024-53053, CVE-2024-50257, CVE-2024-50203, CVE-2024-56643, CVE-2024-50231, CVE-2024-53066, CVE-2024-53105, CVE-2024-53233, CVE-2024-56703, CVE-2024-56725, CVE-2024-50172, CVE-2024-53160, CVE-2024-50131, CVE-2024-53196, CVE-2024-56645, CVE-2024-50304, CVE-2024-56746, CVE-2024-53232, CVE-2024-49906, CVE-2024-53129, CVE-2024-53135, CVE-2024-56545, CVE-2024-56600, CVE-2024-56642, CVE-2024-43098, CVE-2024-50291, CVE-2024-53219, CVE-2024-53197, CVE-2024-53084, CVE-2024-53155, CVE-2024-53094, CVE-2024-56581, CVE-2024-56531, CVE-2024-50300, CVE-2024-50232, CVE-2024-56590, CVE-2024-48881, CVE-2024-56708, CVE-2024-56632, CVE-2024-53051, CVE-2024-53177, CVE-2024-56698, CVE-2024-56707, CVE-2024-56693, CVE-2024-53213, CVE-2024-53121, CVE-2024-56681, CVE-2024-56607, CVE-2024-53120, CVE-2024-56615, CVE-2024-53109, CVE-2024-50209, CVE-2024-56592, CVE-2024-50103, CVE-2024-56722, CVE-2024-53046, CVE-2024-50155, CVE-2024-56765, CVE-2024-56572, CVE-2024-56611, CVE-2024-56679, CVE-2024-50259, CVE-2024-50111, CVE-2024-53217, CVE-2024-53113, CVE-2024-53101, CVE-2024-50208, CVE-2024-53115, CVE-2024-56691, CVE-2024-50137, CVE-2024-53194, CVE-2024-41935, CVE-2024-56584, CVE-2022-49034, CVE-2024-53072, CVE-2024-41932, CVE-2024-56729, CVE-2024-53095, CVE-2024-56755, CVE-2024-50268, CVE-2024-56631, CVE-2024-48875, CVE-2025-21756, CVE-2024-50127, CVE-2024-50136, CVE-2024-56562, CVE-2024-56683, CVE-2024-50250, CVE-2024-53184, CVE-2024-50205, CVE-2024-56543, CVE-2024-56787, CVE-2024-50116, CVE-2024-53096, CVE-2024-53169, CVE-2024-50154, CVE-2024-53230, CVE-2024-50247, CVE-2024-56570, CVE-2024-56583, CVE-2025-21702, CVE-2024-50126, CVE-2024-50151, CVE-2024-53208, CVE-2024-50153, CVE-2024-56619, CVE-2024-56532, CVE-2024-56776, CVE-2024-53093, CVE-2024-53139, CVE-2024-50263, CVE-2024-41014, CVE-2024-53126, CVE-2024-53052, CVE-2024-56636, CVE-2024-50299, CVE-2024-56601, CVE-2024-56569, CVE-2024-53168, CVE-2024-53112, CVE-2024-56576, CVE-2024-50230, CVE-2024-56630, CVE-2024-50010, CVE-2024-56599, CVE-2024-50156, CVE-2024-50286, CVE-2024-53174, CVE-2024-50216, CVE-2024-56744, CVE-2024-50265, CVE-2024-50255, CVE-2024-56567, CVE-2024-50118, CVE-2024-50276, CVE-2024-53099, CVE-2024-50234, CVE-2024-56745, CVE-2024-53114, CVE-2024-50273, CVE-2024-49899, CVE-2024-56608, CVE-2024-56625, CVE-2024-56577, CVE-2024-56596, CVE-2024-56634, CVE-2024-56777, CVE-2024-47141, CVE-2024-53180, CVE-2024-56701, CVE-2024-53158, CVE-2024-56566, CVE-2024-56616, CVE-2024-53117, CVE-2024-53181, CVE-2024-50115, CVE-2024-56772, CVE-2024-53163, CVE-2024-50140, CVE-2024-56633, CVE-2024-50262, CVE-2024-56677, CVE-2024-53201, CVE-2024-57850, CVE-2024-50271, CVE-2024-50279, CVE-2024-50226, CVE-2024-53191, CVE-2024-45828, CVE-2024-53106, CVE-2024-50275, CVE-2024-50245, CVE-2024-56783, CVE-2024-50261, CVE-2024-50283, CVE-2024-53062, CVE-2024-50240, CVE-2024-53183, CVE-2024-53222, CVE-2024-53119, CVE-2024-53138, CVE-2024-52332, CVE-2024-50167, CVE-2024-53042, CVE-2024-50169, CVE-2024-50162, CVE-2024-53087, CVE-2024-50298, CVE-2024-56610, CVE-2024-53060, CVE-2024-56578, CVE-2024-50272, CVE-2024-56604, CVE-2024-50287, CVE-2024-47809, CVE-2024-56603, CVE-2024-50237, CVE-2024-56647, CVE-2024-56747, CVE-2024-50221, CVE-2024-53215, CVE-2024-56550, CVE-2024-56748, CVE-2024-56557, CVE-2024-48873, CVE-2024-49569, CVE-2024-50206, CVE-2024-56781, CVE-2024-56638, CVE-2024-50218, CVE-2024-53055, CVE-2024-57838, CVE-2024-50267, CVE-2024-56575, CVE-2024-53202, CVE-2024-53154, CVE-2024-53176, CVE-2024-56779, CVE-2024-50210, CVE-2024-56589, CVE-2024-50130, CVE-2024-53190, CVE-2024-53082, CVE-2024-56549, CVE-2024-56594, CVE-2024-50294, CVE-2024-56754, CVE-2024-53142, CVE-2024-50295, CVE-2024-57872, CVE-2024-53081, CVE-2024-56629, CVE-2024-53209, CVE-2024-56558, CVE-2024-50164, CVE-2024-53162, CVE-2024-56539, CVE-2024-56721, CVE-2024-50121, CVE-2024-56651, CVE-2024-56609, CVE-2024-50207, CVE-2024-50220, CVE-2024-53228, CVE-2024-53171, CVE-2024-53110, CVE-2024-53146, CVE-2024-53148, CVE-2024-50284, CVE-2024-56739, CVE-2024-48876, CVE-2024-50222, CVE-2024-53079, CVE-2024-53048, CVE-2024-50135, CVE-2024-56726, CVE-2024-50110, CVE-2024-53145, CVE-2024-53198, CVE-2024-50249, CVE-2024-44955, CVE-2024-56573, CVE-2024-53047, CVE-2024-50133, CVE-2024-53091, CVE-2024-53134, CVE-2024-50128, CVE-2024-56648, CVE-2024-53111, CVE-2024-50258, CVE-2024-56587, CVE-2024-56644, CVE-2024-53229, CVE-2024-56727, CVE-2024-50159, CVE-2024-57874, CVE-2024-50166, CVE-2024-53210, CVE-2024-53172, CVE-2024-53107, CVE-2024-56620, CVE-2024-53076, CVE-2024-50236, CVE-2024-56627, CVE-2024-56771, CVE-2024-56724, CVE-2024-50235, CVE-2024-50270, CVE-2024-50160, CVE-2024-50067, CVE-2024-56641, CVE-2024-50297, CVE-2024-53178, CVE-2024-53231, CVE-2024-56692, CVE-2024-53128, CVE-2024-56635, CVE-2024-42122, CVE-2024-50223, CVE-2024-56586, CVE-2024-50242, CVE-2024-50256, CVE-2024-56756, CVE-2024-56782, CVE-2024-50145, CVE-2024-56704, CVE-2024-50146, CVE-2024-53058, CVE-2024-56588, CVE-2024-53187, CVE-2024-56548, CVE-2024-56579, CVE-2024-50248, CVE-2024-50125, CVE-2024-57876, CVE-2024-56687, CVE-2024-53061, CVE-2024-53118, CVE-2024-56622, CVE-2024-53083, CVE-2024-53220, CVE-2024-56637) Update Instructions: Run `sudo pro fix USN-7450-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-cloud-tools-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-cloud-tools-gkeop - 6.8.0-1010.12 linux-cloud-tools-gkeop-6.8 - 6.8.0-1010.12 linux-gkeop - 6.8.0-1010.12 linux-gkeop-6.8 - 6.8.0-1010.12 linux-gkeop-cloud-tools-6.8.0-1010 - 6.8.0-1010.12 linux-gkeop-headers-6.8.0-1010 - 6.8.0-1010.12 linux-gkeop-tools-6.8.0-1010 - 6.8.0-1010.12 linux-headers-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-headers-gkeop - 6.8.0-1010.12 linux-headers-gkeop-6.8 - 6.8.0-1010.12 linux-image-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-image-gkeop - 6.8.0-1010.12 linux-image-gkeop-6.8 - 6.8.0-1010.12 linux-image-unsigned-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-extra-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-extra-gkeop - 6.8.0-1010.12 linux-modules-extra-gkeop-6.8 - 6.8.0-1010.12 linux-tools-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-tools-gkeop - 6.8.0-1010.12 linux-tools-gkeop-6.8 - 6.8.0-1010.12 No subscription required linux-buildinfo-6.8.0-1023-gke - 6.8.0-1023.27 linux-gke - 6.8.0-1023.27 linux-gke-headers-6.8.0-1023 - 6.8.0-1023.27 linux-gke-tools-6.8.0-1023 - 6.8.0-1023.27 linux-headers-6.8.0-1023-gke - 6.8.0-1023.27 linux-headers-gke - 6.8.0-1023.27 linux-image-6.8.0-1023-gke - 6.8.0-1023.27 linux-image-gke - 6.8.0-1023.27 linux-image-unsigned-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-extra-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-iwlwifi-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-iwlwifi-gke - 6.8.0-1023.27 linux-tools-6.8.0-1023-gke - 6.8.0-1023.27 linux-tools-gke - 6.8.0-1023.27 No subscription required linux-buildinfo-6.8.0-1028-gcp - 6.8.0-1028.30 linux-buildinfo-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-gcp-headers-6.8.0-1028 - 6.8.0-1028.30 linux-gcp-lts-24.04 - 6.8.0-1028.30 linux-gcp-tools-6.8.0-1028 - 6.8.0-1028.30 linux-headers-6.8.0-1028-gcp - 6.8.0-1028.30 linux-headers-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-headers-gcp-lts-24.04 - 6.8.0-1028.30 linux-image-6.8.0-1028-gcp - 6.8.0-1028.30 linux-image-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-image-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-image-gcp-lts-24.04 - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-gcp - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-6.8.0-1028-gcp - 6.8.0-1028.30 linux-modules-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-gcp - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1028.30 linux-tools-6.8.0-1028-gcp - 6.8.0-1028.30 linux-tools-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-tools-gcp-lts-24.04 - 6.8.0-1028.30 No subscription required
High
CVE-2022-49034
CVE-2024-41014
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49569
CVE-2024-49899
CVE-2024-49906
CVE-2024-50010
CVE-2024-50051
CVE-2024-50067
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50169
CVE-2024-50170
CVE-2024-50172
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50210
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50249
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53060
CVE-2024-53061
CVE-2024-53062
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53142
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53185
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53201
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56561
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56596
CVE-2024-56597
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56765
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57838
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21993
USN-7453-1 -- Linux kernel (Real-time) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-53187, CVE-2024-50268, CVE-2024-53161, CVE-2024-56721, CVE-2024-53059, CVE-2024-53217, CVE-2022-49034, CVE-2024-53061, CVE-2024-50284, CVE-2024-50167, CVE-2024-53221, CVE-2024-56773, CVE-2024-53051, CVE-2024-50263, CVE-2024-56631, CVE-2024-53106, CVE-2024-50051, CVE-2024-50164, CVE-2024-56533, CVE-2024-53218, CVE-2024-56678, CVE-2024-56692, CVE-2024-50155, CVE-2025-21702, CVE-2024-53100, CVE-2024-50208, CVE-2024-56707, CVE-2024-56781, CVE-2024-48873, CVE-2024-50159, CVE-2024-50138, CVE-2024-50291, CVE-2024-53091, CVE-2024-56708, CVE-2024-50142, CVE-2024-50105, CVE-2024-50299, CVE-2024-50203, CVE-2024-53210, CVE-2024-56625, CVE-2024-53147, CVE-2024-50226, CVE-2024-50294, CVE-2024-50128, CVE-2024-53060, CVE-2024-56776, CVE-2024-56586, CVE-2024-56569, CVE-2024-53214, CVE-2024-53172, CVE-2024-48881, CVE-2024-53119, CVE-2024-50121, CVE-2024-53195, CVE-2024-56703, CVE-2024-56572, CVE-2024-50225, CVE-2024-50133, CVE-2024-50280, CVE-2024-53190, CVE-2024-56685, CVE-2024-53067, CVE-2024-56538, CVE-2024-53200, CVE-2024-56694, CVE-2024-53173, CVE-2024-53118, CVE-2024-53047, CVE-2024-50103, CVE-2024-56638, CVE-2024-50257, CVE-2024-53171, CVE-2024-57874, CVE-2024-56626, CVE-2024-56611, CVE-2024-56642, CVE-2024-56636, CVE-2025-21756, CVE-2024-53188, CVE-2024-56633, CVE-2024-53181, CVE-2024-50218, CVE-2024-56771, CVE-2024-56778, CVE-2024-56568, CVE-2024-56720, CVE-2024-50249, CVE-2024-53175, CVE-2024-53160, CVE-2024-53093, CVE-2024-56754, CVE-2024-53084, CVE-2024-53215, CVE-2024-47794, CVE-2024-50287, CVE-2024-49899, CVE-2024-56651, CVE-2024-53191, CVE-2024-56744, CVE-2024-50158, CVE-2024-56619, CVE-2024-53162, CVE-2024-53208, CVE-2024-56729, CVE-2024-56545, CVE-2024-56605, CVE-2024-48876, CVE-2024-50290, CVE-2024-53154, CVE-2024-56620, CVE-2025-21700, CVE-2024-53148, CVE-2024-50156, CVE-2024-53138, CVE-2024-50269, CVE-2024-50141, CVE-2024-56551, CVE-2024-50221, CVE-2024-50288, CVE-2024-56546, CVE-2024-50209, CVE-2024-53234, CVE-2024-50232, CVE-2024-53086, CVE-2024-53232, CVE-2024-50112, CVE-2024-57838, CVE-2024-53220, CVE-2024-53121, CVE-2024-53142, CVE-2024-56610, CVE-2024-57872, CVE-2024-50160, CVE-2024-50010, CVE-2024-56690, CVE-2024-53128, CVE-2024-56650, CVE-2024-53158, CVE-2024-57850, CVE-2024-53088, CVE-2024-56629, CVE-2024-50239, CVE-2024-50145, CVE-2024-56724, CVE-2024-56566, CVE-2024-50303, CVE-2024-53053, CVE-2024-56539, CVE-2024-50153, CVE-2024-50242, CVE-2024-53055, CVE-2024-53127, CVE-2024-56751, CVE-2024-56588, CVE-2024-56691, CVE-2024-53180, CVE-2024-53076, CVE-2024-53072, CVE-2024-53196, CVE-2024-56679, CVE-2024-53042, CVE-2024-56777, CVE-2024-42122, CVE-2024-50244, CVE-2024-50169, CVE-2024-50205, CVE-2024-53110, CVE-2024-53157, CVE-2024-50295, CVE-2024-53680, CVE-2024-56613, CVE-2024-53194, CVE-2024-56779, CVE-2024-56597, CVE-2024-50130, CVE-2024-53083, CVE-2024-50246, CVE-2024-53131, CVE-2024-53107, CVE-2024-56756, CVE-2024-56727, CVE-2024-50162, CVE-2024-50273, CVE-2024-56726, CVE-2024-50255, CVE-2024-53185, CVE-2024-50137, CVE-2024-41932, CVE-2024-56787, CVE-2024-56765, CVE-2024-56601, CVE-2024-56698, CVE-2024-56558, CVE-2024-57876, CVE-2024-56581, CVE-2024-53202, CVE-2024-50236, CVE-2024-56681, CVE-2024-50297, CVE-2024-53203, CVE-2024-53081, CVE-2024-53155, CVE-2024-50275, CVE-2024-56630, CVE-2024-50166, CVE-2024-57843, CVE-2024-56677, CVE-2024-53094, CVE-2024-53048, CVE-2024-50125, CVE-2024-50216, CVE-2024-56774, CVE-2024-44955, CVE-2024-56748, CVE-2024-50223, CVE-2024-53087, CVE-2024-56775, CVE-2024-50298, CVE-2024-56627, CVE-2024-50139, CVE-2024-53134, CVE-2024-53224, CVE-2024-53150, CVE-2024-56704, CVE-2024-53198, CVE-2024-53111, CVE-2024-50251, CVE-2024-53082, CVE-2024-56785, CVE-2024-56647, CVE-2024-50282, CVE-2024-53058, CVE-2024-56637, CVE-2024-50283, CVE-2024-50135, CVE-2024-56622, CVE-2024-50301, CVE-2024-50147, CVE-2024-50252, CVE-2024-56567, CVE-2024-50230, CVE-2024-53105, CVE-2024-56574, CVE-2024-56589, CVE-2024-56543, CVE-2024-50267, CVE-2024-53163, CVE-2024-53123, CVE-2024-50248, CVE-2024-53219, CVE-2024-50238, CVE-2024-50296, CVE-2024-56593, CVE-2024-56645, CVE-2024-50270, CVE-2024-56780, CVE-2024-56576, CVE-2024-53114, CVE-2024-53089, CVE-2024-56644, CVE-2024-56739, CVE-2024-53184, CVE-2024-56700, CVE-2024-56786, CVE-2024-43098, CVE-2024-50115, CVE-2024-53201, CVE-2024-50220, CVE-2024-53226, CVE-2024-53222, CVE-2024-53133, CVE-2024-50222, CVE-2024-56640, CVE-2024-50206, CVE-2024-53229, CVE-2024-41014, CVE-2024-50272, CVE-2024-56641, CVE-2024-53237, CVE-2024-50207, CVE-2024-53168, CVE-2024-56592, CVE-2024-53090, CVE-2024-56782, CVE-2024-53043, CVE-2024-50289, CVE-2024-56687, CVE-2024-56755, CVE-2024-50111, CVE-2024-57849, CVE-2024-53231, CVE-2024-56550, CVE-2024-50247, CVE-2024-53085, CVE-2024-56745, CVE-2024-56600, CVE-2024-56596, CVE-2024-50150, CVE-2024-56623, CVE-2024-53108, CVE-2024-56579, CVE-2024-50151, CVE-2024-56548, CVE-2024-56565, CVE-2024-50110, CVE-2024-47141, CVE-2024-41935, CVE-2024-50274, CVE-2024-56603, CVE-2024-53197, CVE-2024-56688, CVE-2024-56577, CVE-2024-53174, CVE-2024-56723, CVE-2024-56616, CVE-2024-56573, CVE-2024-53044, CVE-2024-53109, CVE-2024-52332, CVE-2024-53079, CVE-2024-50131, CVE-2024-53068, CVE-2024-50163, CVE-2024-56772, CVE-2024-56634, CVE-2024-53095, CVE-2024-50215, CVE-2024-50243, CVE-2024-50265, CVE-2024-56540, CVE-2024-53045, CVE-2024-56562, CVE-2024-53135, CVE-2024-56689, CVE-2024-56570, CVE-2024-53066, CVE-2024-53145, CVE-2024-56580, CVE-2024-53101, CVE-2024-53177, CVE-2024-53183, CVE-2024-53115, CVE-2024-56722, CVE-2025-21993, CVE-2024-49569, CVE-2025-21831, CVE-2024-50279, CVE-2024-53052, CVE-2024-53113, CVE-2024-50292, CVE-2024-50224, CVE-2024-50259, CVE-2024-56615, CVE-2024-56649, CVE-2024-53169, CVE-2024-56635, CVE-2024-50261, CVE-2024-50172, CVE-2024-53228, CVE-2024-53166, CVE-2024-50140, CVE-2024-50170, CVE-2024-56587, CVE-2024-56607, CVE-2024-56575, CVE-2024-53099, CVE-2024-49906, CVE-2024-50234, CVE-2024-56531, CVE-2024-50127, CVE-2024-56608, CVE-2024-56583, CVE-2024-56648, CVE-2024-48875, CVE-2024-50152, CVE-2024-53062, CVE-2024-53176, CVE-2024-50250, CVE-2024-53233, CVE-2024-56578, CVE-2024-53112, CVE-2024-53146, CVE-2024-56590, CVE-2024-56584, CVE-2024-50211, CVE-2024-50116, CVE-2024-50124, CVE-2024-50067, CVE-2024-53050, CVE-2024-45828, CVE-2024-47809, CVE-2024-50276, CVE-2024-56557, CVE-2024-50304, CVE-2024-56742, CVE-2024-50108, CVE-2024-53122, CVE-2024-56602, CVE-2024-50235, CVE-2024-50278, CVE-2024-56561, CVE-2024-56632, CVE-2025-21701, CVE-2024-56752, CVE-2024-50262, CVE-2024-56621, CVE-2024-53129, CVE-2024-50285, CVE-2024-56643, CVE-2024-53227, CVE-2024-50258, CVE-2024-53139, CVE-2024-53209, CVE-2024-56701, CVE-2024-56594, CVE-2024-53223, CVE-2024-50136, CVE-2024-50256, CVE-2024-53178, CVE-2024-53236, CVE-2024-56549, CVE-2024-56683, CVE-2024-53126, CVE-2024-53120, CVE-2024-53117, CVE-2024-50104, CVE-2024-50146, CVE-2024-53239, CVE-2024-56599, CVE-2024-50210, CVE-2024-56609, CVE-2024-50245, CVE-2024-56705, CVE-2024-56604, CVE-2024-50118, CVE-2024-56783, CVE-2024-50271, CVE-2024-53151, CVE-2024-56728, CVE-2024-56746, CVE-2024-53213, CVE-2024-50231, CVE-2024-56532, CVE-2024-53130, CVE-2024-50143, CVE-2024-50286, CVE-2024-53230, CVE-2024-53096, CVE-2024-50154, CVE-2024-50237, CVE-2024-50240, CVE-2024-56725, CVE-2024-56693, CVE-2024-56606, CVE-2024-50126, CVE-2024-56747, CVE-2024-50107, CVE-2024-50300, CVE-2024-47143, CVE-2024-53046, CVE-2024-50120) Update Instructions: Run `sudo pro fix USN-7453-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1020-realtime - 6.8.1-1020.21 linux-cloud-tools-6.8.1-1020-realtime - 6.8.1-1020.21 linux-headers-6.8.1-1020-realtime - 6.8.1-1020.21 linux-headers-realtime - 6.8.1-1020.21 linux-headers-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-6.8.1-1020-realtime - 6.8.1-1020.21 linux-image-realtime - 6.8.1-1020.21 linux-image-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-uc-6.8.1-1020-realtime - 6.8.1-1020.21 linux-image-uc-realtime - 6.8.1-1020.21 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-unsigned-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-extra-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1020.21 linux-realtime - 6.8.1-1020.21 linux-realtime-cloud-tools-6.8.1-1020 - 6.8.1-1020.21 linux-realtime-headers-6.8.1-1020 - 6.8.1-1020.21 linux-realtime-hwe-24.04 - 6.8.1-1020.21 linux-realtime-tools-6.8.1-1020 - 6.8.1-1020.21 linux-tools-6.8.1-1020-realtime - 6.8.1-1020.21 linux-tools-realtime - 6.8.1-1020.21 linux-tools-realtime-hwe-24.04 - 6.8.1-1020.21 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2022-49034
CVE-2024-41014
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49569
CVE-2024-49899
CVE-2024-49906
CVE-2024-50010
CVE-2024-50051
CVE-2024-50067
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50169
CVE-2024-50170
CVE-2024-50172
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50210
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50249
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53060
CVE-2024-53061
CVE-2024-53062
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53142
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53185
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53201
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56561
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56596
CVE-2024-56597
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56765
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57838
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21993
USN-7454-1 -- libarchive vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the libarchive bsdunzip utility incorrectly handled certain ZIP archive files. If a user or automated system were tricked into processing a specially crafted ZIP archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-1632) It was discovered that libarchive incorrectly handled certain TAR archive files. If a user or automated system were tricked into processing a specially crafted TAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-25724) Update Instructions: Run `sudo pro fix USN-7454-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.4 libarchive-tools - 3.7.2-2ubuntu0.4 libarchive13t64 - 3.7.2-2ubuntu0.4 No subscription required
Medium
CVE-2025-1632
CVE-2025-25724
USN-7456-1 -- Twig vulnerabilities
Ubuntu 24.04 LTS
Fabien Potencier discovered that Twig did not run sandbox security checks in some circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-45411) Jamie Schouten discovered that Twig could bypass the security policy for an object call. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-51754) Update Instructions: Run `sudo pro fix USN-7456-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-twig - 3.8.0-2ubuntu0.1~esm1 php-twig-cache-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-cssinliner-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-doc - 3.8.0-2ubuntu0.1~esm1 php-twig-extra-bundle - 3.8.0-2ubuntu0.1~esm1 php-twig-html-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-inky-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-intl-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-markdown-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-string-extra - 3.8.0-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-45411
CVE-2024-51754
USN-7457-1 -- OpenSSH vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenSSH incorrectly handled the DisableForwarding directive. The directive would fail to disable X11 and agent forwarding, contrary to documentation and expectations. Update Instructions: Run `sudo pro fix USN-7457-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.11 openssh-server - 1:9.6p1-3ubuntu13.11 openssh-sftp-server - 1:9.6p1-3ubuntu13.11 openssh-tests - 1:9.6p1-3ubuntu13.11 ssh - 1:9.6p1-3ubuntu13.11 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.11 No subscription required
Medium
CVE-2025-32728
USN-7464-1 -- Jupyter Notebook vulnerability
Ubuntu 24.04 LTS
It was discovered that Jupyter Notebook did not properly parse HTML comments under certain circumstances. An attacker could possibly use this issue to cause a regular expression denial of service (ReDoS). Update Instructions: Run `sudo pro fix USN-7464-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: jupyter-notebook - 6.4.12-2.2ubuntu1+esm1 python-notebook-doc - 6.4.12-2.2ubuntu1+esm1 python3-notebook - 6.4.12-2.2ubuntu1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-25887
USN-7467-1 -- libxml2 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the libxml2 Python bindings incorrectly handled certain return values. An attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32414) It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32415) Update Instructions: Run `sudo pro fix USN-7467-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.3 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.3 No subscription required
Medium
CVE-2025-32414
CVE-2025-32415
USN-7468-1 -- Linux kernel (Azure, N-Series) vulnerabilities
Ubuntu 24.04 LTS
Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - Kernel Samepage Merging mechanism; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Perf events; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Timer subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netlink; - Packet sockets; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-49996, CVE-2024-56693, CVE-2024-49928, CVE-2024-47728, CVE-2024-50218, CVE-2024-50197, CVE-2024-50084, CVE-2024-56698, CVE-2024-56623, CVE-2024-50203, CVE-2024-56786, CVE-2024-53198, CVE-2024-49939, CVE-2024-49852, CVE-2024-49920, CVE-2024-53117, CVE-2024-50023, CVE-2024-56581, CVE-2024-49954, CVE-2024-56658, CVE-2024-56688, CVE-2024-56574, CVE-2024-56690, CVE-2024-53158, CVE-2024-56777, CVE-2024-56582, CVE-2024-56629, CVE-2024-49997, CVE-2024-50041, CVE-2024-53052, CVE-2024-50126, CVE-2024-56726, CVE-2024-50007, CVE-2024-47712, CVE-2024-50225, CVE-2024-50269, CVE-2024-50200, CVE-2024-53099, CVE-2024-50083, CVE-2024-53162, CVE-2024-57876, CVE-2024-50180, CVE-2024-56678, CVE-2024-50179, CVE-2024-56776, CVE-2024-53151, CVE-2024-56631, CVE-2024-50160, CVE-2024-50302, CVE-2024-53126, CVE-2024-50151, CVE-2024-49917, CVE-2024-49899, CVE-2024-49927, CVE-2024-48875, CVE-2024-50298, CVE-2024-53148, CVE-2024-53160, CVE-2024-50187, CVE-2024-50072, CVE-2024-56756, CVE-2024-56625, CVE-2024-44955, CVE-2024-47671, CVE-2024-47141, CVE-2024-50047, CVE-2024-50048, CVE-2024-50245, CVE-2024-50096, CVE-2024-56602, CVE-2024-53232, CVE-2024-50284, CVE-2024-53129, CVE-2024-56724, CVE-2024-56632, CVE-2024-49924, CVE-2024-47756, CVE-2024-53226, CVE-2024-50189, CVE-2024-56573, CVE-2024-50257, CVE-2024-50300, CVE-2024-47673, CVE-2024-50152, CVE-2024-53215, CVE-2024-50295, CVE-2024-50111, CVE-2024-49865, CVE-2024-47691, CVE-2024-56649, CVE-2024-56567, CVE-2024-53061, CVE-2024-50153, CVE-2024-53091, CVE-2024-56692, CVE-2024-41932, CVE-2024-56650, CVE-2024-56645, CVE-2024-47670, CVE-2024-53130, CVE-2024-50066, CVE-2024-50020, CVE-2024-50154, CVE-2024-49998, CVE-2024-50290, CVE-2024-56594, CVE-2024-56627, CVE-2024-49882, CVE-2024-50220, CVE-2024-49914, CVE-2024-50019, CVE-2024-53213, CVE-2024-50015, CVE-2024-53172, CVE-2024-50198, CVE-2024-53051, CVE-2024-50280, CVE-2024-53187, CVE-2024-50136, CVE-2024-47672, CVE-2024-56606, CVE-2024-47699, CVE-2024-56780, CVE-2024-56672, CVE-2024-56637, CVE-2024-49946, CVE-2024-56752, CVE-2024-50199, CVE-2024-53119, CVE-2024-53084, CVE-2024-50076, CVE-2024-49938, CVE-2024-50237, CVE-2024-56779, CVE-2024-50108, CVE-2024-50162, CVE-2024-49936, CVE-2024-41935, CVE-2024-53046, CVE-2024-56572, CVE-2024-53107, CVE-2024-53150, CVE-2024-56539, CVE-2024-49949, CVE-2024-41014, CVE-2024-53217, CVE-2024-49977, CVE-2025-21702, CVE-2024-50267, CVE-2024-50138, CVE-2024-50229, CVE-2024-56586, CVE-2024-50057, CVE-2024-50070, CVE-2024-49898, CVE-2024-50085, CVE-2024-56746, CVE-2024-53106, CVE-2024-47695, CVE-2024-50009, CVE-2024-50103, CVE-2024-47693, CVE-2024-53135, CVE-2024-53127, CVE-2024-50067, CVE-2024-57850, CVE-2024-56615, CVE-2024-50167, CVE-2024-50042, CVE-2024-56546, CVE-2024-47749, CVE-2024-47705, CVE-2024-47747, CVE-2024-56570, CVE-2024-56604, CVE-2024-53112, CVE-2024-49988, CVE-2024-56597, CVE-2024-50268, CVE-2024-53121, CVE-2024-56635, CVE-2024-50002, CVE-2024-50127, CVE-2024-56603, CVE-2024-56531, CVE-2024-49890, CVE-2024-53157, CVE-2024-50246, CVE-2024-56562, CVE-2024-56722, CVE-2024-49912, CVE-2024-56774, CVE-2024-49893, CVE-2024-56593, CVE-2024-53131, CVE-2024-57798, CVE-2024-50275, CVE-2024-50075, CVE-2024-53174, CVE-2024-53087, CVE-2024-50155, CVE-2024-47696, CVE-2024-53155, CVE-2024-50201, CVE-2024-53134, CVE-2024-49922, CVE-2024-53138, CVE-2024-47711, CVE-2024-47742, CVE-2024-53043, CVE-2024-48881, CVE-2024-53203, CVE-2024-53053, CVE-2024-56589, CVE-2024-56679, CVE-2024-49892, CVE-2024-56677, CVE-2024-53144, CVE-2024-50107, CVE-2024-56583, CVE-2025-21701, CVE-2024-49911, CVE-2024-50244, CVE-2024-49969, CVE-2024-50098, CVE-2024-50166, CVE-2024-47809, CVE-2024-56781, CVE-2024-49894, CVE-2025-21700, CVE-2024-49930, CVE-2024-56548, CVE-2024-50134, CVE-2024-53194, CVE-2024-50285, CVE-2024-42122, CVE-2024-53171, CVE-2024-53120, CVE-2024-50279, CVE-2024-57838, CVE-2024-50082, CVE-2024-50168, CVE-2024-53175, CVE-2024-47710, CVE-2024-49972, CVE-2024-56727, CVE-2024-49919, CVE-2024-53066, CVE-2024-56708, CVE-2024-53142, CVE-2024-49896, CVE-2024-49950, CVE-2024-53114, CVE-2024-47737, CVE-2024-56721, CVE-2024-50030, CVE-2024-50063, CVE-2024-56704, CVE-2024-56694, CVE-2024-49937, CVE-2024-56596, CVE-2024-49855, CVE-2024-53231, CVE-2024-50259, CVE-2024-50163, CVE-2024-50263, CVE-2024-56579, CVE-2024-50148, CVE-2024-50252, CVE-2024-56775, CVE-2024-53195, CVE-2024-56771, CVE-2024-56765, CVE-2024-50192, CVE-2024-56705, CVE-2024-56566, CVE-2024-49851, CVE-2024-56575, CVE-2024-53222, CVE-2024-50014, CVE-2024-49891, CVE-2024-53128, CVE-2024-49921, CVE-2024-50024, CVE-2024-56703, CVE-2024-56787, CVE-2024-56723, CVE-2024-56687, CVE-2024-47718, CVE-2024-49902, CVE-2024-49963, CVE-2024-56691, CVE-2024-53173, CVE-2024-56599, CVE-2024-50080, CVE-2024-47704, CVE-2024-49934, CVE-2024-56707, CVE-2024-49958, CVE-2024-49888, CVE-2024-53095, CVE-2024-53089, CVE-2024-49935, CVE-2024-50022, CVE-2024-47748, CVE-2024-56634, CVE-2024-53090, CVE-2024-50242, CVE-2024-53085, CVE-2024-50073, CVE-2024-50068, CVE-2024-49877, CVE-2024-56642, CVE-2024-53067, CVE-2024-50118, CVE-2024-50061, CVE-2024-49948, CVE-2024-53100, CVE-2024-50194, CVE-2024-50116, CVE-2024-48873, CVE-2024-53180, CVE-2024-56663, CVE-2024-50303, CVE-2024-50250, CVE-2024-50045, CVE-2024-50296, CVE-2024-49961, CVE-2024-56549, CVE-2024-50027, CVE-2024-53227, CVE-2024-50292, CVE-2024-49900, CVE-2024-50074, CVE-2024-53115, CVE-2024-56747, CVE-2024-50078, CVE-2024-56772, CVE-2024-53141, CVE-2024-50301, CVE-2024-53079, CVE-2024-50255, CVE-2024-56565, CVE-2024-53165, CVE-2024-52332, CVE-2024-53140, CVE-2024-50286, CVE-2024-53088, CVE-2024-53139, CVE-2024-49881, CVE-2024-49859, CVE-2024-50247, CVE-2024-50278, CVE-2024-50124, CVE-2024-47709, CVE-2024-50128, CVE-2024-49962, CVE-2024-50258, CVE-2024-56532, CVE-2024-47684, CVE-2024-56633, CVE-2024-53210, CVE-2024-49867, CVE-2024-50056, CVE-2024-50137, CVE-2024-47730, CVE-2024-49960, CVE-2024-50060, CVE-2024-49925, CVE-2024-50195, CVE-2024-50031, CVE-2024-50099, CVE-2024-49863, CVE-2024-49992, CVE-2024-53083, CVE-2024-56751, CVE-2024-50141, CVE-2024-47701, CVE-2024-53122, CVE-2024-56576, CVE-2024-47689, CVE-2024-50121, CVE-2024-50147, CVE-2024-50226, CVE-2024-50239, CVE-2024-56578, CVE-2024-50062, CVE-2024-50033, CVE-2024-49982, CVE-2024-56545, CVE-2024-53118, CVE-2024-50231, CVE-2024-50125, CVE-2024-50191, CVE-2024-49875, CVE-2024-47794, CVE-2024-49983, CVE-2024-56595, CVE-2024-50224, CVE-2024-47690, CVE-2024-50272, CVE-2024-49901, CVE-2024-56538, CVE-2024-50010, CVE-2024-49959, CVE-2024-53154, CVE-2024-53221, CVE-2024-49886, CVE-2024-50145, CVE-2024-49884, CVE-2024-50028, CVE-2024-50232, CVE-2024-53208, CVE-2024-50000, CVE-2024-56728, CVE-2024-50304, CVE-2024-49989, CVE-2024-47739, CVE-2024-56550, CVE-2024-50055, CVE-2024-56590, CVE-2024-53055, CVE-2024-50270, CVE-2024-53164, CVE-2024-49856, CVE-2024-57849, CVE-2024-47697, CVE-2024-43098, CVE-2024-50170, CVE-2024-53196, CVE-2024-50251, CVE-2024-56533, CVE-2024-41016, CVE-2024-53105, CVE-2024-53230, CVE-2024-50164, CVE-2024-50101, CVE-2024-56607, CVE-2024-50186, CVE-2024-50105, CVE-2024-47679, CVE-2024-48876, CVE-2024-50243, CVE-2024-47720, CVE-2024-53239, CVE-2024-53062, CVE-2024-50021, CVE-2024-56614, CVE-2024-53224, CVE-2024-56619, CVE-2024-53072, CVE-2024-53223, CVE-2024-50039, CVE-2024-49981, CVE-2024-50230, CVE-2024-47143, CVE-2024-53082, CVE-2024-50216, CVE-2024-47713, CVE-2024-56720, CVE-2024-56543, CVE-2024-53094, CVE-2024-53111, CVE-2024-50036, CVE-2024-50065, CVE-2024-57874, CVE-2024-56689, CVE-2024-53183, CVE-2024-53108, CVE-2024-56643, CVE-2024-49868, CVE-2024-56611, CVE-2024-50185, CVE-2024-50223, CVE-2024-50193, CVE-2024-56616, CVE-2024-50265, CVE-2024-56701, CVE-2024-50112, CVE-2024-50297, CVE-2024-50207, CVE-2024-56558, CVE-2024-56782, CVE-2024-53081, CVE-2024-50044, CVE-2024-50040, CVE-2024-49991, CVE-2024-50013, CVE-2024-53170, CVE-2024-56540, CVE-2024-47723, CVE-2024-49913, CVE-2024-53169, CVE-2024-49974, CVE-2024-50256, CVE-2024-49858, CVE-2024-56609, CVE-2024-50282, CVE-2024-53168, CVE-2024-50182, CVE-2024-49973, CVE-2024-56638, CVE-2024-56683, CVE-2024-50059, CVE-2024-56648, CVE-2024-45828, CVE-2024-56610, CVE-2024-47740, CVE-2024-47692, CVE-2024-50026, CVE-2024-50117, CVE-2024-50221, CVE-2024-49931, CVE-2024-49994, CVE-2024-50184, CVE-2024-50171, CVE-2024-50261, CVE-2024-50283, CVE-2024-50233, CVE-2024-53184, CVE-2024-53220, CVE-2024-53191, CVE-2024-53190, CVE-2024-56592, CVE-2024-47703, CVE-2024-53048, CVE-2024-49955, CVE-2024-50150, CVE-2024-50208, CVE-2024-56577, CVE-2024-50159, CVE-2024-50131, CVE-2024-56755, CVE-2024-50172, CVE-2024-53146, CVE-2024-53161, CVE-2024-50222, CVE-2024-49879, CVE-2024-50146, CVE-2024-53063, CVE-2024-49889, CVE-2024-50287, CVE-2024-56647, CVE-2024-56613, CVE-2024-50017, CVE-2024-56551, CVE-2024-53145, CVE-2024-53166, CVE-2024-56622, CVE-2025-21993, CVE-2024-50133, CVE-2024-53234, CVE-2024-53133, CVE-2024-47735, CVE-2024-49861, CVE-2024-50143, CVE-2024-50169, CVE-2024-50046, CVE-2024-50069, CVE-2024-56742, CVE-2024-50104, CVE-2024-56636, CVE-2024-56745, CVE-2024-56630, CVE-2024-50276, CVE-2024-53228, CVE-2024-49945, CVE-2025-21756, CVE-2024-50142, CVE-2024-56729, CVE-2024-49569, CVE-2024-49952, CVE-2024-50006, CVE-2024-50273, CVE-2024-49906, CVE-2024-53058, CVE-2024-49895, CVE-2024-50240, CVE-2024-49987, CVE-2024-53233, CVE-2024-53086, CVE-2024-50110, CVE-2024-50064, CVE-2024-49878, CVE-2024-56644, CVE-2024-56605, CVE-2024-47698, CVE-2024-53147, CVE-2024-47745, CVE-2024-56685, CVE-2024-50016, CVE-2024-49871, CVE-2024-47757, CVE-2024-53103, CVE-2024-56580, CVE-2024-49883, CVE-2024-53163, CVE-2024-53110, CVE-2024-50058, CVE-2024-56640, CVE-2024-53101, CVE-2024-53156, CVE-2022-49034, CVE-2024-53109, CVE-2024-49978, CVE-2024-50235, CVE-2024-53680, CVE-2024-50299, CVE-2024-53177, CVE-2024-50008, CVE-2024-56744, CVE-2025-21831, CVE-2024-50038, CVE-2024-50271, CVE-2024-53178, CVE-2024-50012, CVE-2024-53188, CVE-2024-49860, CVE-2024-53237, CVE-2024-50188, CVE-2024-49880, CVE-2024-50077, CVE-2024-49968, CVE-2024-50236, CVE-2024-50206, CVE-2024-53197, CVE-2024-56587, CVE-2024-53236, CVE-2024-50139, CVE-2024-50120, CVE-2024-56681, CVE-2024-53059, CVE-2024-53113, CVE-2024-50209, CVE-2024-49957, CVE-2024-49944, CVE-2024-50087, CVE-2024-56754, CVE-2024-49903, CVE-2024-56600, CVE-2024-47706, CVE-2024-49907, CVE-2024-53202, CVE-2024-50215, CVE-2024-47734, CVE-2024-56785, CVE-2024-53229, CVE-2024-53050, CVE-2024-50051, CVE-2024-53209, CVE-2024-56739, CVE-2024-50262, CVE-2024-50088, CVE-2024-56621, CVE-2024-49929, CVE-2024-57843, CVE-2024-56569, CVE-2024-50140, CVE-2024-50135, CVE-2024-57872, CVE-2024-49866, CVE-2024-53214, CVE-2024-50090, CVE-2024-49985, CVE-2024-56608, CVE-2024-56598, CVE-2024-49915, CVE-2024-53104, CVE-2024-50035, CVE-2024-53047, CVE-2024-53176, CVE-2024-56700, CVE-2024-49975, CVE-2024-53200, CVE-2024-50274, CVE-2024-56748, CVE-2024-56601, CVE-2024-50289, CVE-2024-50086, CVE-2024-53044, CVE-2024-50029, CVE-2024-49909, CVE-2024-47738, CVE-2024-47726, CVE-2024-56568, CVE-2024-53181, CVE-2024-53218, CVE-2024-56725, CVE-2024-56778, CVE-2024-50115, CVE-2024-50288, CVE-2024-50291, CVE-2024-50049, CVE-2024-56773, CVE-2024-50001, CVE-2024-49933, CVE-2024-50211, CVE-2024-50095, CVE-2024-56651, CVE-2024-50238, CVE-2024-47707, CVE-2024-50205, CVE-2024-50093, CVE-2024-50183, CVE-2024-56588, CVE-2024-49965, CVE-2024-56584, CVE-2024-53096, CVE-2024-50248, CVE-2024-50234, CVE-2024-49926, CVE-2024-49923, CVE-2024-49918, CVE-2024-50130, CVE-2024-53093, CVE-2024-56626, CVE-2024-50156, CVE-2024-56557, CVE-2024-50196, CVE-2024-56620, CVE-2024-49870, CVE-2024-50294, CVE-2024-53042, CVE-2024-53076, CVE-2024-49905, CVE-2024-53045, CVE-2024-50202, CVE-2024-56641, CVE-2024-53219, CVE-2024-50158, CVE-2024-50025, CVE-2024-47685, CVE-2024-49966, CVE-2024-53123, CVE-2024-53068, CVE-2024-47678) Update Instructions: Run `sudo pro fix USN-7468-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-nvidia - 6.8.0-1014.15 linux-azure-nvidia-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-azure-nvidia-cloud-tools-common - 6.8.0-1014.15 linux-azure-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-azure-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-cloud-tools-azure-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-headers-azure-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-image-azure-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-extra-azure-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-tools-azure-nvidia - 6.8.0-1014.15 No subscription required
High
CVE-2022-49034
CVE-2024-41014
CVE-2024-41016
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47670
CVE-2024-47671
CVE-2024-47672
CVE-2024-47673
CVE-2024-47678
CVE-2024-47679
CVE-2024-47684
CVE-2024-47685
CVE-2024-47689
CVE-2024-47690
CVE-2024-47691
CVE-2024-47692
CVE-2024-47693
CVE-2024-47695
CVE-2024-47696
CVE-2024-47697
CVE-2024-47698
CVE-2024-47699
CVE-2024-47701
CVE-2024-47703
CVE-2024-47704
CVE-2024-47705
CVE-2024-47706
CVE-2024-47707
CVE-2024-47709
CVE-2024-47710
CVE-2024-47711
CVE-2024-47712
CVE-2024-47713
CVE-2024-47718
CVE-2024-47720
CVE-2024-47723
CVE-2024-47726
CVE-2024-47728
CVE-2024-47730
CVE-2024-47734
CVE-2024-47735
CVE-2024-47737
CVE-2024-47738
CVE-2024-47739
CVE-2024-47740
CVE-2024-47742
CVE-2024-47745
CVE-2024-47747
CVE-2024-47748
CVE-2024-47749
CVE-2024-47756
CVE-2024-47757
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49569
CVE-2024-49851
CVE-2024-49852
CVE-2024-49855
CVE-2024-49856
CVE-2024-49858
CVE-2024-49859
CVE-2024-49860
CVE-2024-49861
CVE-2024-49863
CVE-2024-49865
CVE-2024-49866
CVE-2024-49867
CVE-2024-49868
CVE-2024-49870
CVE-2024-49871
CVE-2024-49875
CVE-2024-49877
CVE-2024-49878
CVE-2024-49879
CVE-2024-49880
CVE-2024-49881
CVE-2024-49882
CVE-2024-49883
CVE-2024-49884
CVE-2024-49886
CVE-2024-49888
CVE-2024-49889
CVE-2024-49890
CVE-2024-49891
CVE-2024-49892
CVE-2024-49893
CVE-2024-49894
CVE-2024-49895
CVE-2024-49896
CVE-2024-49898
CVE-2024-49899
CVE-2024-49900
CVE-2024-49901
CVE-2024-49902
CVE-2024-49903
CVE-2024-49905
CVE-2024-49906
CVE-2024-49907
CVE-2024-49909
CVE-2024-49911
CVE-2024-49912
CVE-2024-49913
CVE-2024-49914
CVE-2024-49915
CVE-2024-49917
CVE-2024-49918
CVE-2024-49919
CVE-2024-49920
CVE-2024-49921
CVE-2024-49922
CVE-2024-49923
CVE-2024-49924
CVE-2024-49925
CVE-2024-49926
CVE-2024-49927
CVE-2024-49928
CVE-2024-49929
CVE-2024-49930
CVE-2024-49931
CVE-2024-49933
CVE-2024-49934
CVE-2024-49935
CVE-2024-49936
CVE-2024-49937
CVE-2024-49938
CVE-2024-49939
CVE-2024-49944
CVE-2024-49945
CVE-2024-49946
CVE-2024-49948
CVE-2024-49949
CVE-2024-49950
CVE-2024-49952
CVE-2024-49954
CVE-2024-49955
CVE-2024-49957
CVE-2024-49958
CVE-2024-49959
CVE-2024-49960
CVE-2024-49961
CVE-2024-49962
CVE-2024-49963
CVE-2024-49965
CVE-2024-49966
CVE-2024-49968
CVE-2024-49969
CVE-2024-49972
CVE-2024-49973
CVE-2024-49974
CVE-2024-49975
CVE-2024-49977
CVE-2024-49978
CVE-2024-49981
CVE-2024-49982
CVE-2024-49983
CVE-2024-49985
CVE-2024-49987
CVE-2024-49988
CVE-2024-49989
CVE-2024-49991
CVE-2024-49992
CVE-2024-49994
CVE-2024-49996
CVE-2024-49997
CVE-2024-49998
CVE-2024-50000
CVE-2024-50001
CVE-2024-50002
CVE-2024-50006
CVE-2024-50007
CVE-2024-50008
CVE-2024-50009
CVE-2024-50010
CVE-2024-50012
CVE-2024-50013
CVE-2024-50014
CVE-2024-50015
CVE-2024-50017
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50051
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50067
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50117
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50134
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50148
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50168
CVE-2024-50169
CVE-2024-50170
CVE-2024-50171
CVE-2024-50172
CVE-2024-50179
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50229
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50233
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50302
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53061
CVE-2024-53062
CVE-2024-53063
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53103
CVE-2024-53104
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53140
CVE-2024-53141
CVE-2024-53142
CVE-2024-53144
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53156
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53164
CVE-2024-53165
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53170
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56658
CVE-2024-56663
CVE-2024-56672
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56765
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57798
CVE-2024-57838
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2024-8805
CVE-2025-0927
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21993
CVE-2025-2312
USN-7471-1 -- poppler vulnerabilities
Ubuntu 24.04 LTS
It was discovered that poppler did not properly verify adbe.pkcs7.sha1 signatures in PDF documents. An attacker could possibly use this issue to create documents with forged signatures that are treated as legitimately signed. Update Instructions: Run `sudo pro fix USN-7471-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.4 libpoppler-cpp-dev - 24.02.0-1ubuntu9.4 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.4 libpoppler-dev - 24.02.0-1ubuntu9.4 libpoppler-glib-dev - 24.02.0-1ubuntu9.4 libpoppler-glib-doc - 24.02.0-1ubuntu9.4 libpoppler-glib8t64 - 24.02.0-1ubuntu9.4 libpoppler-private-dev - 24.02.0-1ubuntu9.4 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.4 libpoppler-qt5-dev - 24.02.0-1ubuntu9.4 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.4 libpoppler-qt6-dev - 24.02.0-1ubuntu9.4 libpoppler134 - 24.02.0-1ubuntu9.4 poppler-utils - 24.02.0-1ubuntu9.4 No subscription required
Medium
CVE-2025-43903
USN-7472-1 -- Micropython vulnerabilities
Ubuntu 24.04 LTS
Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled the length of a buffer in mp_vfs_umount, leading to a heap-based buffer overflow vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-8946) Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled memory, leading to a use-after-free vulnerability under certain circumstances. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-8947) It was discovered that Middleware USB Host MCU Component incorrectly handled memory, leading to a buffer overflow vulnerability, If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2021-42553) Update Instructions: Run `sudo pro fix USN-7472-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: micropython - 1.22.1+ds-1ubuntu0.24.04.1~esm1 micropython-doc - 1.22.1+ds-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-42553
CVE-2024-8946
CVE-2024-8947
USN-7473-1 -- Ghostscript vulnerability
Ubuntu 24.04 LTS
It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly bypass file path validation. Update Instructions: Run `sudo pro fix USN-7473-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.6 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.6 libgs-common - 10.02.1~dfsg1-0ubuntu7.6 libgs-dev - 10.02.1~dfsg1-0ubuntu7.6 libgs10 - 10.02.1~dfsg1-0ubuntu7.6 libgs10-common - 10.02.1~dfsg1-0ubuntu7.6 No subscription required
Medium
CVE-2025-46646
USN-7474-1 -- Docker vulnerabilities
Ubuntu 24.04 LTS
Cory Snider discovered that Docker incorrectly handled networking packet encapsulation. An attacker could use this issue to inject internet packets in established connection, possibly causing a denial of service or bypassing firewall protections. This issue only affected Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. (CVE-2023-28840, CVE-2023-28841, CVE-2023-28842) Rory McNamara discovered that Docker incorrectly handled cache in the BuildKit toolkit. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-23651) It was discovered that Docker incorrectly handled parallel operations in some circumstances, which could possibly lead to undefined behavior. (CVE-2024-36621, CVE-2024-36623) Rory McNamara discovered that Docker incorrectly verified file paths during a certain command in the BuildKit toolkit. An attacker could possibly use this issue to delete arbitrary files from the system. (CVE-2024-23652) Update Instructions: Run `sudo pro fix USN-7474-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-docker-docker-dev - 20.10.25+dfsg1-2ubuntu1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-28840
CVE-2023-28841
CVE-2023-28842
CVE-2024-23651
CVE-2024-23652
CVE-2024-36621
CVE-2024-36623
USN-7476-1 -- Scrapy vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Scrapy improperly exposed HTTP authentication credentials to request targets, including during redirects. An attacker could use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-41125) It was discovered that Scrapy did not remove the cookie header during cross-domain redirects. An attacker could possibly use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-0577) It was discovered that Scrapy inefficiently parsed XML content. An attacker could use this issue to cause a denial of service by sending a crafted XML response. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-1892) It was discovered that Scrapy did not properly check response size during decompression. An attacker could send a crafted response that would exhaust memory and cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-3572) It was discovered that Scrapy did not remove the authorization header during cross-domain redirects. An attacker could possibly use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-3574) It was discovered that Scrapy did not remove the authorization header during redirects that change scheme but remain in the same domain. This issue could possibly be used by an attacker to expose sensitive information or to gain unauthorized access to user accounts. (CVE-2024-1968) Update Instructions: Run `sudo pro fix USN-7476-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-scrapy-doc - 2.11.1-1ubuntu0.1~esm2 python3-scrapy - 2.11.1-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-41125
CVE-2022-0577
CVE-2024-1892
CVE-2024-1968
CVE-2024-3572
CVE-2024-3574
USN-7478-1 -- Corosync vulnerability
Ubuntu 24.04 LTS
It was discovered that Corosync incorrectly handled certain large UDP packets. If encryption is disabled, or an attacker knows the encryption key, this issue could be used to cause Corosync to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7478-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: corosync - 3.1.7-1ubuntu3.1 corosync-doc - 3.1.7-1ubuntu3.1 corosync-notifyd - 3.1.7-1ubuntu3.1 corosync-vqsim - 3.1.7-1ubuntu3.1 libcfg-dev - 3.1.7-1ubuntu3.1 libcfg7 - 3.1.7-1ubuntu3.1 libcmap-dev - 3.1.7-1ubuntu3.1 libcmap4 - 3.1.7-1ubuntu3.1 libcorosync-common-dev - 3.1.7-1ubuntu3.1 libcorosync-common4 - 3.1.7-1ubuntu3.1 libcpg-dev - 3.1.7-1ubuntu3.1 libcpg4 - 3.1.7-1ubuntu3.1 libquorum-dev - 3.1.7-1ubuntu3.1 libquorum5 - 3.1.7-1ubuntu3.1 libsam-dev - 3.1.7-1ubuntu3.1 libsam4 - 3.1.7-1ubuntu3.1 libvotequorum-dev - 3.1.7-1ubuntu3.1 libvotequorum8 - 3.1.7-1ubuntu3.1 No subscription required
Medium
CVE-2025-30472
USN-7479-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.42 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. Ubuntu 25.04 has been updated to MySQL 8.4.5. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-42.html https://dev.mysql.com/doc/relnotes/mysql/8.4/en/news-8-4-5.html https://www.oracle.com/security-alerts/cpuapr2025.html Update Instructions: Run `sudo pro fix USN-7479-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.42-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.42-0ubuntu0.24.04.1 mysql-client - 8.0.42-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-router - 8.0.42-0ubuntu0.24.04.1 mysql-server - 8.0.42-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-testsuite - 8.0.42-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.42-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-21574
CVE-2025-21575
CVE-2025-21577
CVE-2025-21579
CVE-2025-21580
CVE-2025-21581
CVE-2025-21584
CVE-2025-21585
CVE-2025-21588
CVE-2025-30681
CVE-2025-30682
CVE-2025-30683
CVE-2025-30684
CVE-2025-30685
CVE-2025-30687
CVE-2025-30688
CVE-2025-30689
CVE-2025-30693
CVE-2025-30695
CVE-2025-30696
CVE-2025-30699
CVE-2025-30703
CVE-2025-30704
CVE-2025-30705
CVE-2025-30715
CVE-2025-30721
CVE-2025-30722
USN-7480-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
Alicja Kario discovered that the JSSE component of OpenJDK 8 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 8 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 8 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7480-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-doc - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jdk - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jdk-headless - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre-headless - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre-zero - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-source - 8u452-ga~us1-0ubuntu1~24.04 No subscription required
Medium
CVE-2025-21587
CVE-2025-30691
CVE-2025-30698
USN-7481-1 -- OpenJDK 11 vulnerabilities
Ubuntu 24.04 LTS
Alicja Kario discovered that the JSSE component of OpenJDK 11 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 11 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 11 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7481-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-doc - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jdk - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre-headless - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre-zero - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-source - 11.0.27+6~us1-0ubuntu1~24.04 No subscription required
Medium
CVE-2025-21587
CVE-2025-30691
CVE-2025-30698
USN-7482-1 -- OpenJDK 17 vulnerabilities
Ubuntu 24.04 LTS
Alicja Kario discovered that the JSSE component of OpenJDK 17 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 17 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 17 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7482-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-doc - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jdk - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jdk-headless - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre-headless - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre-zero - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-source - 17.0.15+6~us1-0ubuntu1~24.04 No subscription required
Medium
CVE-2025-21587
CVE-2025-30691
CVE-2025-30698
USN-7483-1 -- OpenJDK 21 vulnerabilities
Ubuntu 24.04 LTS
Alicja Kario discovered that the JSSE component of OpenJDK 21 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 21 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 21 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7483-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-doc - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jdk - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jdk-headless - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-headless - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-zero - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-source - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-testsupport - 21.0.7+6~us1-0ubuntu1~24.04 No subscription required
Medium
CVE-2025-21587
CVE-2025-30691
CVE-2025-30698
USN-7485-1 -- LibRaw vulnerabilities
Ubuntu 24.04 LTS
It was discovered that LibRaw could be made to read out of bounds. An attacker could possibly use this issue to cause applications using LibRaw to crash, resulting in a denial of service. (CVE-2025-43961, CVE-2025-43962, CVE-2025-43963, CVE-2025-43964) Update Instructions: Run `sudo pro fix USN-7485-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libraw-bin - 0.21.2-2.1ubuntu0.24.04.1 libraw-dev - 0.21.2-2.1ubuntu0.24.04.1 libraw-doc - 0.21.2-2.1ubuntu0.24.04.1 libraw23t64 - 0.21.2-2.1ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-43961
CVE-2025-43962
CVE-2025-43963
CVE-2025-43964
USN-7486-1 -- FastCGI vulnerability
Ubuntu 24.04 LTS
It was discovered that FastCGI incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7486-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libfcgi-bin - 2.4.2-2.1ubuntu0.24.04.1 libfcgi-dev - 2.4.2-2.1ubuntu0.24.04.1 libfcgi0t64 - 2.4.2-2.1ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-23016
USN-7489-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
One security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Timer subsystem; (CVE-2025-21813) Update Instructions: Run `sudo pro fix USN-7489-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-buildinfo-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-cloud-tools-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-headers-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-headers-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-image-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-unsigned-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-image-unsigned-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-modules-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-modules-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-tools-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-tools-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 No subscription required linux-buildinfo-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-buildinfo-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-gcp - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-headers-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-lib-rust-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-gcp-64k - 6.11.0-1014.14~24.04.1 linux-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-gcp-edge - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-headers-gcp - 6.11.0-1014.14~24.04.1 linux-headers-gcp-64k - 6.11.0-1014.14~24.04.1 linux-headers-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-headers-gcp-edge - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-image-gcp - 6.11.0-1014.14~24.04.1 linux-image-gcp-64k - 6.11.0-1014.14~24.04.1 linux-image-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-image-gcp-edge - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-edge - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-tools-gcp - 6.11.0-1014.14~24.04.1 linux-tools-gcp-64k - 6.11.0-1014.14~24.04.1 linux-tools-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-tools-gcp-edge - 6.11.0-1014.14~24.04.1 No subscription required linux-buildinfo-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-buildinfo-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-cloud-tools-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-headers-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-hwe-6.11-headers-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-hwe-6.11-tools-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-image-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-uc-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-uc-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-unsigned-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-unsigned-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-modules-extra-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu6-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-ipu7-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-usbio-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-vision-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-tools-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 No subscription required
Medium
CVE-2025-21813
USN-7490-1 -- libsoup vulnerabilities
Ubuntu 24.04 LTS
Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.3 libsoup-2.4-1 - 2.74.3-6ubuntu1.3 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.3 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.3 libsoup2.4-common - 2.74.3-6ubuntu1.3 libsoup2.4-dev - 2.74.3-6ubuntu1.3 libsoup2.4-doc - 2.74.3-6ubuntu1.3 libsoup2.4-tests - 2.74.3-6ubuntu1.3 No subscription required
Medium
CVE-2025-32906
CVE-2025-32909
CVE-2025-32910
CVE-2025-32911
CVE-2025-32912
CVE-2025-32913
CVE-2025-32914
CVE-2025-46420
CVE-2025-46421
USN-7490-2 -- libsoup regression
Ubuntu 24.04 LTS
USN-7490-1 fixed vulnerabilities in libsoup. It was discovered that the fix for CVE-2025-32912 was incomplete. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.4 libsoup-2.4-1 - 2.74.3-6ubuntu1.4 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.4 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.4 libsoup2.4-common - 2.74.3-6ubuntu1.4 libsoup2.4-dev - 2.74.3-6ubuntu1.4 libsoup2.4-doc - 2.74.3-6ubuntu1.4 libsoup2.4-tests - 2.74.3-6ubuntu1.4 No subscription required
Medium
CVE-2025-32912
https://launchpad.net/bugs/2110056
USN-7490-3 -- libsoup vulnerabilities
Ubuntu 24.04 LTS
USN-7490-1 fixed vulnerabilities in libsoup2.4. This update provides the corresponding updates for libsoup3. Original advisory details: Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-3.0 - 3.4.4-5ubuntu0.3 libsoup-3.0-0 - 3.4.4-5ubuntu0.3 libsoup-3.0-common - 3.4.4-5ubuntu0.3 libsoup-3.0-dev - 3.4.4-5ubuntu0.3 libsoup-3.0-doc - 3.4.4-5ubuntu0.3 libsoup-3.0-tests - 3.4.4-5ubuntu0.3 No subscription required
Medium
CVE-2025-32906
CVE-2025-32909
CVE-2025-32910
CVE-2025-32911
CVE-2025-32912
CVE-2025-32913
CVE-2025-32914
CVE-2025-46420
CVE-2025-46421
USN-7491-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - USB Type-C Connector System Software Interface driver; - Timer subsystem; (CVE-2025-21902, CVE-2025-21813) Update Instructions: Run `sudo pro fix USN-7491-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1021-oem - 6.11.0-1021.21 linux-headers-6.11.0-1021-oem - 6.11.0-1021.21 linux-headers-oem-24.04b - 6.11.0-1021.21 linux-image-6.11.0-1021-oem - 6.11.0-1021.21 linux-image-oem-24.04b - 6.11.0-1021.21 linux-image-uc-6.11.0-1021-oem - 6.11.0-1021.21 linux-image-uc-oem-24.04b - 6.11.0-1021.21 linux-image-unsigned-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu6-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu6-oem-24.04b - 6.11.0-1021.21 linux-modules-ipu7-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu7-oem-24.04b - 6.11.0-1021.21 linux-modules-iwlwifi-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1021.21 linux-modules-usbio-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-usbio-oem-24.04b - 6.11.0-1021.21 linux-modules-vision-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-vision-oem-24.04b - 6.11.0-1021.21 linux-oem-24.04b - 6.11.0-1021.21 linux-oem-6.11-headers-6.11.0-1021 - 6.11.0-1021.21 linux-oem-6.11-tools-6.11.0-1021 - 6.11.0-1021.21 linux-tools-6.11.0-1021-oem - 6.11.0-1021.21 linux-tools-oem-24.04b - 6.11.0-1021.21 No subscription required
Medium
CVE-2025-21813
CVE-2025-21902
USN-7492-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
A security issues was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; (CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7492-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-cloud-tools-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-cloud-tools-gkeop - 6.8.0-1011.13 linux-cloud-tools-gkeop-6.8 - 6.8.0-1011.13 linux-gkeop - 6.8.0-1011.13 linux-gkeop-6.8 - 6.8.0-1011.13 linux-gkeop-cloud-tools-6.8.0-1011 - 6.8.0-1011.13 linux-gkeop-headers-6.8.0-1011 - 6.8.0-1011.13 linux-gkeop-tools-6.8.0-1011 - 6.8.0-1011.13 linux-headers-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-headers-gkeop - 6.8.0-1011.13 linux-headers-gkeop-6.8 - 6.8.0-1011.13 linux-image-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-image-gkeop - 6.8.0-1011.13 linux-image-gkeop-6.8 - 6.8.0-1011.13 linux-image-unsigned-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-extra-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-extra-gkeop - 6.8.0-1011.13 linux-modules-extra-gkeop-6.8 - 6.8.0-1011.13 linux-tools-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-tools-gkeop - 6.8.0-1011.13 linux-tools-gkeop-6.8 - 6.8.0-1011.13 No subscription required linux-buildinfo-6.8.0-1024-gke - 6.8.0-1024.28 linux-gke - 6.8.0-1024.28 linux-gke-headers-6.8.0-1024 - 6.8.0-1024.28 linux-gke-tools-6.8.0-1024 - 6.8.0-1024.28 linux-headers-6.8.0-1024-gke - 6.8.0-1024.28 linux-headers-gke - 6.8.0-1024.28 linux-image-6.8.0-1024-gke - 6.8.0-1024.28 linux-image-gke - 6.8.0-1024.28 linux-image-unsigned-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-extra-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-iwlwifi-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-iwlwifi-gke - 6.8.0-1024.28 linux-tools-6.8.0-1024-gke - 6.8.0-1024.28 linux-tools-gke - 6.8.0-1024.28 No subscription required linux-buildinfo-6.8.0-1025-ibm - 6.8.0-1025.25 linux-headers-6.8.0-1025-ibm - 6.8.0-1025.25 linux-headers-ibm - 6.8.0-1025.25 linux-headers-ibm-classic - 6.8.0-1025.25 linux-headers-ibm-lts-24.04 - 6.8.0-1025.25 linux-ibm - 6.8.0-1025.25 linux-ibm-classic - 6.8.0-1025.25 linux-ibm-headers-6.8.0-1025 - 6.8.0-1025.25 linux-ibm-lts-24.04 - 6.8.0-1025.25 linux-ibm-tools-6.8.0-1025 - 6.8.0-1025.25 linux-image-6.8.0-1025-ibm - 6.8.0-1025.25 linux-image-ibm - 6.8.0-1025.25 linux-image-ibm-classic - 6.8.0-1025.25 linux-image-ibm-lts-24.04 - 6.8.0-1025.25 linux-image-unsigned-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-extra-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-ibm-classic - 6.8.0-1025.25 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1025.25 linux-tools-6.8.0-1025-ibm - 6.8.0-1025.25 linux-tools-ibm - 6.8.0-1025.25 linux-tools-ibm-classic - 6.8.0-1025.25 linux-tools-ibm-lts-24.04 - 6.8.0-1025.25 No subscription required linux-buildinfo-6.8.0-1025-oracle - 6.8.0-1025.26 linux-buildinfo-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-headers-6.8.0-1025-oracle - 6.8.0-1025.26 linux-headers-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-headers-oracle - 6.8.0-1025.26 linux-headers-oracle-64k - 6.8.0-1025.26 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-headers-oracle-lts-24.04 - 6.8.0-1025.26 linux-image-6.8.0-1025-oracle - 6.8.0-1025.26 linux-image-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-image-oracle - 6.8.0-1025.26 linux-image-oracle-64k - 6.8.0-1025.26 linux-image-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-image-oracle-lts-24.04 - 6.8.0-1025.26 linux-image-unsigned-6.8.0-1025-oracle - 6.8.0-1025.26 linux-image-unsigned-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-modules-6.8.0-1025-oracle - 6.8.0-1025.26 linux-modules-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-modules-extra-6.8.0-1025-oracle - 6.8.0-1025.26 linux-modules-extra-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-oracle - 6.8.0-1025.26 linux-oracle-64k - 6.8.0-1025.26 linux-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-oracle-headers-6.8.0-1025 - 6.8.0-1025.26 linux-oracle-lts-24.04 - 6.8.0-1025.26 linux-oracle-tools-6.8.0-1025 - 6.8.0-1025.26 linux-tools-6.8.0-1025-oracle - 6.8.0-1025.26 linux-tools-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-tools-oracle - 6.8.0-1025.26 linux-tools-oracle-64k - 6.8.0-1025.26 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-tools-oracle-lts-24.04 - 6.8.0-1025.26 No subscription required linux-buildinfo-6.8.0-1027-oem - 6.8.0-1027.27 linux-headers-6.8.0-1027-oem - 6.8.0-1027.27 linux-headers-oem-24.04 - 6.8.0-1027.27 linux-headers-oem-24.04a - 6.8.0-1027.27 linux-image-6.8.0-1027-oem - 6.8.0-1027.27 linux-image-oem-24.04 - 6.8.0-1027.27 linux-image-oem-24.04a - 6.8.0-1027.27 linux-image-uc-6.8.0-1027-oem - 6.8.0-1027.27 linux-image-uc-oem-24.04 - 6.8.0-1027.27 linux-image-uc-oem-24.04a - 6.8.0-1027.27 linux-image-unsigned-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-ipu6-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-ipu6-oem-24.04 - 6.8.0-1027.27 linux-modules-ipu6-oem-24.04a - 6.8.0-1027.27 linux-modules-iwlwifi-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1027.27 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1027.27 linux-modules-usbio-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-usbio-oem-24.04 - 6.8.0-1027.27 linux-modules-usbio-oem-24.04a - 6.8.0-1027.27 linux-oem-24.04 - 6.8.0-1027.27 linux-oem-24.04a - 6.8.0-1027.27 linux-oem-6.8-headers-6.8.0-1027 - 6.8.0-1027.27 linux-oem-6.8-tools-6.8.0-1027 - 6.8.0-1027.27 linux-tools-6.8.0-1027-oem - 6.8.0-1027.27 linux-tools-oem-24.04 - 6.8.0-1027.27 linux-tools-oem-24.04a - 6.8.0-1027.27 No subscription required linux-buildinfo-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-buildinfo-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-cloud-tools-nvidia - 6.8.0-1027.30 linux-headers-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-headers-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-headers-nvidia - 6.8.0-1027.30 linux-headers-nvidia-64k - 6.8.0-1027.30 linux-image-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-image-nvidia - 6.8.0-1027.30 linux-image-nvidia-64k - 6.8.0-1027.30 linux-image-uc-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-uc-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-image-unsigned-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-unsigned-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-extra-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-nvidia-fs-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1027.30 linux-nvidia - 6.8.0-1027.30 linux-nvidia-64k - 6.8.0-1027.30 linux-nvidia-headers-6.8.0-1027 - 6.8.0-1027.30 linux-nvidia-tools-6.8.0-1027 - 6.8.0-1027.30 linux-tools-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-tools-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-tools-nvidia - 6.8.0-1027.30 linux-tools-nvidia-64k - 6.8.0-1027.30 No subscription required linux-buildinfo-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-buildinfo-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-headers-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-uc-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-uc-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-unsigned-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-unsigned-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-extra-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-nvidia-lowlatency - 6.8.0-1027.30.1 linux-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-nvidia-lowlatency-headers-6.8.0-1027 - 6.8.0-1027.30.1 linux-nvidia-lowlatency-tools-6.8.0-1027 - 6.8.0-1027.30.1 linux-tools-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-tools-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-tools-nvidia-lowlatency - 6.8.0-1027.30.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1027.30.1 No subscription required linux-aws - 6.8.0-1028.30 linux-aws-cloud-tools-6.8.0-1028 - 6.8.0-1028.30 linux-aws-headers-6.8.0-1028 - 6.8.0-1028.30 linux-aws-lts-24.04 - 6.8.0-1028.30 linux-aws-tools-6.8.0-1028 - 6.8.0-1028.30 linux-buildinfo-6.8.0-1028-aws - 6.8.0-1028.30 linux-cloud-tools-6.8.0-1028-aws - 6.8.0-1028.30 linux-headers-6.8.0-1028-aws - 6.8.0-1028.30 linux-headers-aws - 6.8.0-1028.30 linux-headers-aws-lts-24.04 - 6.8.0-1028.30 linux-image-6.8.0-1028-aws - 6.8.0-1028.30 linux-image-aws - 6.8.0-1028.30 linux-image-aws-lts-24.04 - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-extra-aws - 6.8.0-1028.30 linux-modules-extra-aws-lts-24.04 - 6.8.0-1028.30 linux-tools-6.8.0-1028-aws - 6.8.0-1028.30 linux-tools-aws - 6.8.0-1028.30 linux-tools-aws-lts-24.04 - 6.8.0-1028.30 No subscription required linux-buildinfo-6.8.0-1029-gcp - 6.8.0-1029.31 linux-buildinfo-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-gcp-headers-6.8.0-1029 - 6.8.0-1029.31 linux-gcp-lts-24.04 - 6.8.0-1029.31 linux-gcp-tools-6.8.0-1029 - 6.8.0-1029.31 linux-headers-6.8.0-1029-gcp - 6.8.0-1029.31 linux-headers-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-headers-gcp-lts-24.04 - 6.8.0-1029.31 linux-image-6.8.0-1029-gcp - 6.8.0-1029.31 linux-image-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-image-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-image-gcp-lts-24.04 - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-gcp - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-6.8.0-1029-gcp - 6.8.0-1029.31 linux-modules-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-gcp - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1029.31 linux-tools-6.8.0-1029-gcp - 6.8.0-1029.31 linux-tools-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-tools-gcp-lts-24.04 - 6.8.0-1029.31 No subscription required linux-bpf-dev - 6.8.0-59.61 linux-buildinfo-6.8.0-59-generic - 6.8.0-59.61 linux-buildinfo-6.8.0-59-generic-64k - 6.8.0-59.61 linux-cloud-tools-6.8.0-59 - 6.8.0-59.61 linux-cloud-tools-6.8.0-59-generic - 6.8.0-59.61 linux-cloud-tools-common - 6.8.0-59.61 linux-cloud-tools-generic - 6.8.0-59.61 linux-cloud-tools-virtual - 6.8.0-59.61 linux-crashdump - 6.8.0-59.61 linux-doc - 6.8.0-59.61 linux-generic - 6.8.0-59.61 linux-generic-64k - 6.8.0-59.61 linux-generic-lpae - 6.8.0-59.61 linux-headers-6.8.0-59 - 6.8.0-59.61 linux-headers-6.8.0-59-generic - 6.8.0-59.61 linux-headers-6.8.0-59-generic-64k - 6.8.0-59.61 linux-headers-generic - 6.8.0-59.61 linux-headers-generic-64k - 6.8.0-59.61 linux-headers-generic-lpae - 6.8.0-59.61 linux-headers-kvm - 6.8.0-59.61 linux-headers-laptop-23.10 - 6.8.0-59.61 linux-headers-oem-20.04 - 6.8.0-59.61 linux-headers-oem-20.04b - 6.8.0-59.61 linux-headers-oem-20.04c - 6.8.0-59.61 linux-headers-oem-20.04d - 6.8.0-59.61 linux-headers-oem-22.04 - 6.8.0-59.61 linux-headers-virtual - 6.8.0-59.61 linux-image-6.8.0-59-generic - 6.8.0-59.61 linux-image-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-extra-virtual - 6.8.0-59.61 linux-image-generic - 6.8.0-59.61 linux-image-generic-64k - 6.8.0-59.61 linux-image-generic-lpae - 6.8.0-59.61 linux-image-kvm - 6.8.0-59.61 linux-image-laptop-23.10 - 6.8.0-59.61 linux-image-oem-20.04 - 6.8.0-59.61 linux-image-oem-20.04b - 6.8.0-59.61 linux-image-oem-20.04c - 6.8.0-59.61 linux-image-oem-20.04d - 6.8.0-59.61 linux-image-oem-22.04 - 6.8.0-59.61 linux-image-uc-6.8.0-59-generic - 6.8.0-59.61 linux-image-uc-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-uc-generic - 6.8.0-59.61 linux-image-unsigned-6.8.0-59-generic - 6.8.0-59.61 linux-image-unsigned-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-virtual - 6.8.0-59.61 linux-kvm - 6.8.0-59.61 linux-laptop-23.10 - 6.8.0-59.61 linux-lib-rust-6.8.0-59-generic - 6.8.0-59.61 linux-libc-dev - 6.8.0-59.61 linux-modules-6.8.0-59-generic - 6.8.0-59.61 linux-modules-6.8.0-59-generic-64k - 6.8.0-59.61 linux-modules-extra-6.8.0-59-generic - 6.8.0-59.61 linux-modules-ipu6-6.8.0-59-generic - 6.8.0-59.61 linux-modules-ipu6-generic - 6.8.0-59.61 linux-modules-iwlwifi-6.8.0-59-generic - 6.8.0-59.61 linux-modules-iwlwifi-generic - 6.8.0-59.61 linux-modules-iwlwifi-oem-20.04 - 6.8.0-59.61 linux-modules-iwlwifi-oem-20.04d - 6.8.0-59.61 linux-modules-iwlwifi-oem-22.04 - 6.8.0-59.61 linux-modules-usbio-6.8.0-59-generic - 6.8.0-59.61 linux-modules-usbio-generic - 6.8.0-59.61 linux-oem-20.04 - 6.8.0-59.61 linux-oem-20.04b - 6.8.0-59.61 linux-oem-20.04c - 6.8.0-59.61 linux-oem-20.04d - 6.8.0-59.61 linux-oem-22.04 - 6.8.0-59.61 linux-source - 6.8.0-59.61 linux-source-6.8.0 - 6.8.0-59.61 linux-tools-6.8.0-59 - 6.8.0-59.61 linux-tools-6.8.0-59-generic - 6.8.0-59.61 linux-tools-6.8.0-59-generic-64k - 6.8.0-59.61 linux-tools-common - 6.8.0-59.61 linux-tools-generic - 6.8.0-59.61 linux-tools-generic-64k - 6.8.0-59.61 linux-tools-generic-lpae - 6.8.0-59.61 linux-tools-host - 6.8.0-59.61 linux-tools-kvm - 6.8.0-59.61 linux-tools-laptop-23.10 - 6.8.0-59.61 linux-tools-oem-20.04 - 6.8.0-59.61 linux-tools-oem-20.04b - 6.8.0-59.61 linux-tools-oem-20.04c - 6.8.0-59.61 linux-tools-oem-20.04d - 6.8.0-59.61 linux-tools-oem-22.04 - 6.8.0-59.61 linux-tools-virtual - 6.8.0-59.61 linux-virtual - 6.8.0-59.61 No subscription required linux-buildinfo-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-buildinfo-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-cloud-tools-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-cloud-tools-lowlatency - 6.8.0-59.61.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-headers-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-headers-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-headers-lowlatency - 6.8.0-59.61.1 linux-headers-lowlatency-64k - 6.8.0-59.61.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-image-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-image-lowlatency - 6.8.0-59.61.1 linux-image-lowlatency-64k - 6.8.0-59.61.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-unsigned-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-image-unsigned-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-lowlatency - 6.8.0-59.61.1 linux-lowlatency-64k - 6.8.0-59.61.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-lowlatency-cloud-tools-6.8.0-59 - 6.8.0-59.61.1 linux-lowlatency-headers-6.8.0-59 - 6.8.0-59.61.1 linux-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-lowlatency-lib-rust-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-lowlatency-tools-6.8.0-59 - 6.8.0-59.61.1 linux-modules-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-modules-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-modules-iwlwifi-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-modules-iwlwifi-lowlatency - 6.8.0-59.61.1 linux-tools-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-tools-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-tools-lowlatency - 6.8.0-59.61.1 linux-tools-lowlatency-64k - 6.8.0-59.61.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 No subscription required
High
CVE-2024-56653
USN-7492-2 -- Linux kernel (Real-time) vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; (CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7492-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1021-realtime - 6.8.1-1021.22 linux-cloud-tools-6.8.1-1021-realtime - 6.8.1-1021.22 linux-headers-6.8.1-1021-realtime - 6.8.1-1021.22 linux-headers-realtime - 6.8.1-1021.22 linux-headers-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-6.8.1-1021-realtime - 6.8.1-1021.22 linux-image-realtime - 6.8.1-1021.22 linux-image-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-uc-6.8.1-1021-realtime - 6.8.1-1021.22 linux-image-uc-realtime - 6.8.1-1021.22 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-unsigned-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-extra-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1021.22 linux-realtime - 6.8.1-1021.22 linux-realtime-cloud-tools-6.8.1-1021 - 6.8.1-1021.22 linux-realtime-headers-6.8.1-1021 - 6.8.1-1021.22 linux-realtime-hwe-24.04 - 6.8.1-1021.22 linux-realtime-tools-6.8.1-1021 - 6.8.1-1021.22 linux-tools-6.8.1-1021-realtime - 6.8.1-1021.22 linux-tools-realtime - 6.8.1-1021.22 linux-tools-realtime-hwe-24.04 - 6.8.1-1021.22 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2024-56653
USN-7493-1 -- Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Clock framework and drivers; (CVE-2024-58081) Update Instructions: Run `sudo pro fix USN-7493-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-raspi - 6.8.0-1024.28 linux-headers-6.8.0-1024-raspi - 6.8.0-1024.28 linux-headers-raspi - 6.8.0-1024.28 linux-image-6.8.0-1024-raspi - 6.8.0-1024.28 linux-image-raspi - 6.8.0-1024.28 linux-modules-6.8.0-1024-raspi - 6.8.0-1024.28 linux-raspi - 6.8.0-1024.28 linux-raspi-headers-6.8.0-1024 - 6.8.0-1024.28 linux-raspi-tools-6.8.0-1024 - 6.8.0-1024.28 linux-tools-6.8.0-1024-raspi - 6.8.0-1024.28 linux-tools-raspi - 6.8.0-1024.28 No subscription required
Medium
CVE-2024-58081
USN-7497-1 -- CarrierWave vulnerabilities
Ubuntu 24.04 LTS
Rikita Ishikawa discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-21305) Norihide Saito discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-49090) Update Instructions: Run `sudo pro fix USN-7497-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-carrierwave - 1.3.2-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-21305
CVE-2023-49090
USN-7499-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Timer subsystem; (CVE-2025-21813, CVE-2025-21953) Update Instructions: Run `sudo pro fix USN-7499-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1014.14~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-6.11-headers-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-6.11-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-edge - 6.11.0-1014.14~24.04.1 linux-azure-fde - 6.11.0-1014.14~24.04.1 linux-azure-fde-edge - 6.11.0-1014.14~24.04.1 linux-buildinfo-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-headers-azure - 6.11.0-1014.14~24.04.1 linux-headers-azure-edge - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-azure-fde - 6.11.0-1014.14~24.04.1 linux-image-azure - 6.11.0-1014.14~24.04.1 linux-image-azure-edge - 6.11.0-1014.14~24.04.1 linux-image-azure-fde - 6.11.0-1014.14~24.04.1 linux-image-azure-fde-edge - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-tools-azure - 6.11.0-1014.14~24.04.1 linux-tools-azure-edge - 6.11.0-1014.14~24.04.1 No subscription required
Medium
CVE-2025-21813
CVE-2025-21953
USN-7500-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; - Microsoft Azure Network Adapter (MANA) driver; (CVE-2025-21953, CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7500-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.8.0-1028 - 6.8.0-1028.33 linux-azure-fde-lts-24.04 - 6.8.0-1028.33 linux-azure-headers-6.8.0-1028 - 6.8.0-1028.33 linux-azure-lts-24.04 - 6.8.0-1028.33 linux-azure-tools-6.8.0-1028 - 6.8.0-1028.33 linux-buildinfo-6.8.0-1028-azure - 6.8.0-1028.33 linux-cloud-tools-6.8.0-1028-azure - 6.8.0-1028.33 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1028.33 linux-headers-6.8.0-1028-azure - 6.8.0-1028.33 linux-headers-azure-lts-24.04 - 6.8.0-1028.33 linux-image-6.8.0-1028-azure - 6.8.0-1028.33 linux-image-6.8.0-1028-azure-fde - 6.8.0-1028.33 linux-image-azure-fde-lts-24.04 - 6.8.0-1028.33 linux-image-azure-lts-24.04 - 6.8.0-1028.33 linux-image-unsigned-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-extra-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-extra-azure-lts-24.04 - 6.8.0-1028.33 linux-modules-involflt-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1028.33 linux-modules-iwlwifi-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1028.33 linux-tools-6.8.0-1028-azure - 6.8.0-1028.33 linux-tools-azure-lts-24.04 - 6.8.0-1028.33 No subscription required
High
CVE-2024-56653
CVE-2025-21953
USN-7501-1 -- Django vulnerability
Ubuntu 24.04 LTS
Elias Myllymäki discovered that Django incorrectly handled stripping large sequences of incomplete HTML tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7501-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.7 python3-django - 3:4.2.11-1ubuntu1.7 No subscription required
Medium
CVE-2025-32873
USN-7503-1 -- h11 vulnerability
Ubuntu 24.04 LTS
Jeppe Bonde Weikop discovered that h11 incorrectly handled crafted HTTP requests. A remote attacker could possibly use this issue to smuggle malicious HTTP requests, which could potentially lead to security control bypass and information leakage. Update Instructions: Run `sudo pro fix USN-7503-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-h11 - 0.14.0-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-43859
USN-7504-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
Juraj Šarinay discovered that LibreOffice incorrectly handled verifying PDF signatures. A remote attacker could possibly use this issue to generate PDF files that appear to have a valid signature. Update Instructions: Run `sudo pro fix USN-7504-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.4 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.4 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.4 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.4 libjuh-java - 4:24.2.7-0ubuntu0.24.04.4 libjurt-java - 4:24.2.7-0ubuntu0.24.04.4 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.4 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.4 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.4 libreoffice - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.4 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.4 libridl-java - 4:24.2.7-0ubuntu0.24.04.4 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libunoil-java - 4:24.2.7-0ubuntu0.24.04.4 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.4 python3-access2base - 4:24.2.7-0ubuntu0.24.04.4 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.4 python3-uno - 4:24.2.7-0ubuntu0.24.04.4 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.4 ure - 4:24.2.7-0ubuntu0.24.04.4 ure-java - 4:24.2.7-0ubuntu0.24.04.4 No subscription required
Medium
CVE-2025-2866
USN-7505-1 -- Abseil vulnerability
Ubuntu 24.04 LTS
It was discovered that Abseil incorrectly handled memory with the upper bound of the size argument. An attacker could possibly use this issue to cause a denial of service or memory corruption. Update Instructions: Run `sudo pro fix USN-7505-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libabsl-dev - 20220623.1-3.1ubuntu3.2 libabsl20220623t64 - 20220623.1-3.1ubuntu3.2 No subscription required
Medium
CVE-2025-0838
USN-7507-1 -- Rack vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Rack incorrectly handled deleted rack sessions. An attacker could possibly use this issue to expose sensitive information or to gain unauthorized access to user accounts. (CVE-2025-32441) It was discovered that Rack incorrectly limited the number of parameters in a web request. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-46727) Update Instructions: Run `sudo pro fix USN-7507-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.3 No subscription required
Medium
CVE-2025-46727
CVE-2025-32441
USN-7508-1 -- Open VM Tools vulnerability
Ubuntu 24.04 LTS
It was discovered that Open VM Tools incorrectly handled certain file operations. An attacker in a guest could use this issue to perform insecure file operations and possibly elevate privileges in the guest. Update Instructions: Run `sudo pro fix USN-7508-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: open-vm-tools - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-containerinfo - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-desktop - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-dev - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-salt-minion - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-sdmp - 2:12.4.5-1~ubuntu0.24.04.2 No subscription required
Medium
CVE-2025-22247
USN-7509-1 -- .NET vulnerability
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle file names and paths under certain conditions. An attacker could possibly use this issue to perform spoofing over a network. Update Instructions: Run `sudo pro fix USN-7509-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.116-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.116-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.116-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.116-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.116-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.116-8.0.16-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.16-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.16-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2025-26646
USN-7513-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56372, CVE-2025-21639, CVE-2024-57897, CVE-2024-56770, CVE-2024-57898, CVE-2025-21655, CVE-2024-56667, CVE-2024-41013, CVE-2024-57888, CVE-2025-21658, CVE-2024-57911, CVE-2024-56654, CVE-2024-57904, CVE-2024-56664, CVE-2024-57806, CVE-2024-56758, CVE-2024-57912, CVE-2025-21649, CVE-2024-56369, CVE-2025-21656, CVE-2025-21643, CVE-2024-57884, CVE-2025-21640, CVE-2024-56769, CVE-2024-57939, CVE-2025-21635, CVE-2024-57902, CVE-2024-36476, CVE-2025-21646, CVE-2024-57887, CVE-2024-57882, CVE-2024-57792, CVE-2024-56759, CVE-2024-57901, CVE-2024-56764, CVE-2025-21654, CVE-2024-57899, CVE-2025-21664, CVE-2024-56715, CVE-2024-56760, CVE-2024-57926, CVE-2024-57938, CVE-2025-21637, CVE-2024-55881, CVE-2024-57916, CVE-2024-57908, CVE-2024-57910, CVE-2024-57892, CVE-2024-57890, CVE-2024-56662, CVE-2024-57793, CVE-2024-47408, CVE-2024-49568, CVE-2024-57946, CVE-2024-53690, CVE-2024-56716, CVE-2024-57801, CVE-2024-56670, CVE-2024-56709, CVE-2024-57885, CVE-2024-57791, CVE-2024-38608, CVE-2024-56763, CVE-2024-57906, CVE-2024-47736, CVE-2024-56761, CVE-2024-56659, CVE-2025-21636, CVE-2024-57913, CVE-2024-56710, CVE-2025-21660, CVE-2024-57945, CVE-2024-39282, CVE-2024-53687, CVE-2024-57907, CVE-2024-53179, CVE-2025-21659, CVE-2024-57805, CVE-2024-57889, CVE-2024-57940, CVE-2025-21645, CVE-2024-56660, CVE-2024-56718, CVE-2024-57802, CVE-2024-56767, CVE-2024-56717, CVE-2024-58087, CVE-2025-21647, CVE-2025-21650, CVE-2024-57895, CVE-2025-21632, CVE-2024-54193, CVE-2024-57893, CVE-2025-21652, CVE-2025-21634, CVE-2024-56652, CVE-2024-57929, CVE-2024-57804, CVE-2024-57925, CVE-2024-57932, CVE-2024-54683, CVE-2025-21663, CVE-2024-56665, CVE-2024-54455, CVE-2025-21642, CVE-2024-57931, CVE-2025-21971, CVE-2024-56656, CVE-2025-21651, CVE-2024-49571, CVE-2025-21631, CVE-2024-56675, CVE-2024-53125, CVE-2025-21938, CVE-2024-57879, CVE-2024-56657, CVE-2024-57807, CVE-2024-57841, CVE-2024-57903, CVE-2024-53685, CVE-2024-57896, CVE-2024-57900, CVE-2024-57883, CVE-2024-58237, CVE-2025-21638, CVE-2024-55639, CVE-2025-21653, CVE-2025-21648, CVE-2024-54460, CVE-2024-57933, CVE-2024-55916, CVE-2024-57917, CVE-2025-21662) Update Instructions: Run `sudo pro fix USN-7513-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1026-ibm - 6.8.0-1026.26 linux-headers-6.8.0-1026-ibm - 6.8.0-1026.26 linux-headers-ibm - 6.8.0-1026.26 linux-headers-ibm-classic - 6.8.0-1026.26 linux-headers-ibm-lts-24.04 - 6.8.0-1026.26 linux-ibm - 6.8.0-1026.26 linux-ibm-classic - 6.8.0-1026.26 linux-ibm-headers-6.8.0-1026 - 6.8.0-1026.26 linux-ibm-lts-24.04 - 6.8.0-1026.26 linux-ibm-tools-6.8.0-1026 - 6.8.0-1026.26 linux-image-6.8.0-1026-ibm - 6.8.0-1026.26 linux-image-ibm - 6.8.0-1026.26 linux-image-ibm-classic - 6.8.0-1026.26 linux-image-ibm-lts-24.04 - 6.8.0-1026.26 linux-image-unsigned-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-extra-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-ibm-classic - 6.8.0-1026.26 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1026.26 linux-tools-6.8.0-1026-ibm - 6.8.0-1026.26 linux-tools-ibm - 6.8.0-1026.26 linux-tools-ibm-classic - 6.8.0-1026.26 linux-tools-ibm-lts-24.04 - 6.8.0-1026.26 No subscription required linux-buildinfo-6.8.0-1026-oracle - 6.8.0-1026.27 linux-buildinfo-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-headers-6.8.0-1026-oracle - 6.8.0-1026.27 linux-headers-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-headers-oracle - 6.8.0-1026.27 linux-headers-oracle-64k - 6.8.0-1026.27 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-headers-oracle-lts-24.04 - 6.8.0-1026.27 linux-image-6.8.0-1026-oracle - 6.8.0-1026.27 linux-image-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-image-oracle - 6.8.0-1026.27 linux-image-oracle-64k - 6.8.0-1026.27 linux-image-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-image-oracle-lts-24.04 - 6.8.0-1026.27 linux-image-unsigned-6.8.0-1026-oracle - 6.8.0-1026.27 linux-image-unsigned-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-modules-6.8.0-1026-oracle - 6.8.0-1026.27 linux-modules-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-modules-extra-6.8.0-1026-oracle - 6.8.0-1026.27 linux-modules-extra-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-oracle - 6.8.0-1026.27 linux-oracle-64k - 6.8.0-1026.27 linux-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-oracle-headers-6.8.0-1026 - 6.8.0-1026.27 linux-oracle-lts-24.04 - 6.8.0-1026.27 linux-oracle-tools-6.8.0-1026 - 6.8.0-1026.27 linux-tools-6.8.0-1026-oracle - 6.8.0-1026.27 linux-tools-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-tools-oracle - 6.8.0-1026.27 linux-tools-oracle-64k - 6.8.0-1026.27 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-tools-oracle-lts-24.04 - 6.8.0-1026.27 No subscription required linux-aws - 6.8.0-1029.31 linux-aws-cloud-tools-6.8.0-1029 - 6.8.0-1029.31 linux-aws-headers-6.8.0-1029 - 6.8.0-1029.31 linux-aws-lts-24.04 - 6.8.0-1029.31 linux-aws-tools-6.8.0-1029 - 6.8.0-1029.31 linux-buildinfo-6.8.0-1029-aws - 6.8.0-1029.31 linux-cloud-tools-6.8.0-1029-aws - 6.8.0-1029.31 linux-headers-6.8.0-1029-aws - 6.8.0-1029.31 linux-headers-aws - 6.8.0-1029.31 linux-headers-aws-lts-24.04 - 6.8.0-1029.31 linux-image-6.8.0-1029-aws - 6.8.0-1029.31 linux-image-aws - 6.8.0-1029.31 linux-image-aws-lts-24.04 - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-extra-aws - 6.8.0-1029.31 linux-modules-extra-aws-lts-24.04 - 6.8.0-1029.31 linux-tools-6.8.0-1029-aws - 6.8.0-1029.31 linux-tools-aws - 6.8.0-1029.31 linux-tools-aws-lts-24.04 - 6.8.0-1029.31 No subscription required linux-bpf-dev - 6.8.0-60.63 linux-buildinfo-6.8.0-60-generic - 6.8.0-60.63 linux-buildinfo-6.8.0-60-generic-64k - 6.8.0-60.63 linux-cloud-tools-6.8.0-60 - 6.8.0-60.63 linux-cloud-tools-6.8.0-60-generic - 6.8.0-60.63 linux-cloud-tools-common - 6.8.0-60.63 linux-cloud-tools-generic - 6.8.0-60.63 linux-cloud-tools-virtual - 6.8.0-60.63 linux-crashdump - 6.8.0-60.63 linux-doc - 6.8.0-60.63 linux-generic - 6.8.0-60.63 linux-generic-64k - 6.8.0-60.63 linux-generic-lpae - 6.8.0-60.63 linux-headers-6.8.0-60 - 6.8.0-60.63 linux-headers-6.8.0-60-generic - 6.8.0-60.63 linux-headers-6.8.0-60-generic-64k - 6.8.0-60.63 linux-headers-generic - 6.8.0-60.63 linux-headers-generic-64k - 6.8.0-60.63 linux-headers-generic-lpae - 6.8.0-60.63 linux-headers-kvm - 6.8.0-60.63 linux-headers-laptop-23.10 - 6.8.0-60.63 linux-headers-oem-20.04 - 6.8.0-60.63 linux-headers-oem-20.04b - 6.8.0-60.63 linux-headers-oem-20.04c - 6.8.0-60.63 linux-headers-oem-20.04d - 6.8.0-60.63 linux-headers-oem-22.04 - 6.8.0-60.63 linux-headers-virtual - 6.8.0-60.63 linux-image-6.8.0-60-generic - 6.8.0-60.63 linux-image-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-extra-virtual - 6.8.0-60.63 linux-image-generic - 6.8.0-60.63 linux-image-generic-64k - 6.8.0-60.63 linux-image-generic-lpae - 6.8.0-60.63 linux-image-kvm - 6.8.0-60.63 linux-image-laptop-23.10 - 6.8.0-60.63 linux-image-oem-20.04 - 6.8.0-60.63 linux-image-oem-20.04b - 6.8.0-60.63 linux-image-oem-20.04c - 6.8.0-60.63 linux-image-oem-20.04d - 6.8.0-60.63 linux-image-oem-22.04 - 6.8.0-60.63 linux-image-uc-6.8.0-60-generic - 6.8.0-60.63 linux-image-uc-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-uc-generic - 6.8.0-60.63 linux-image-unsigned-6.8.0-60-generic - 6.8.0-60.63 linux-image-unsigned-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-virtual - 6.8.0-60.63 linux-kvm - 6.8.0-60.63 linux-laptop-23.10 - 6.8.0-60.63 linux-lib-rust-6.8.0-60-generic - 6.8.0-60.63 linux-libc-dev - 6.8.0-60.63 linux-modules-6.8.0-60-generic - 6.8.0-60.63 linux-modules-6.8.0-60-generic-64k - 6.8.0-60.63 linux-modules-extra-6.8.0-60-generic - 6.8.0-60.63 linux-modules-ipu6-6.8.0-60-generic - 6.8.0-60.63 linux-modules-ipu6-generic - 6.8.0-60.63 linux-modules-iwlwifi-6.8.0-60-generic - 6.8.0-60.63 linux-modules-iwlwifi-generic - 6.8.0-60.63 linux-modules-iwlwifi-oem-20.04 - 6.8.0-60.63 linux-modules-iwlwifi-oem-20.04d - 6.8.0-60.63 linux-modules-iwlwifi-oem-22.04 - 6.8.0-60.63 linux-modules-usbio-6.8.0-60-generic - 6.8.0-60.63 linux-modules-usbio-generic - 6.8.0-60.63 linux-oem-20.04 - 6.8.0-60.63 linux-oem-20.04b - 6.8.0-60.63 linux-oem-20.04c - 6.8.0-60.63 linux-oem-20.04d - 6.8.0-60.63 linux-oem-22.04 - 6.8.0-60.63 linux-source - 6.8.0-60.63 linux-source-6.8.0 - 6.8.0-60.63 linux-tools-6.8.0-60 - 6.8.0-60.63 linux-tools-6.8.0-60-generic - 6.8.0-60.63 linux-tools-6.8.0-60-generic-64k - 6.8.0-60.63 linux-tools-common - 6.8.0-60.63 linux-tools-generic - 6.8.0-60.63 linux-tools-generic-64k - 6.8.0-60.63 linux-tools-generic-lpae - 6.8.0-60.63 linux-tools-host - 6.8.0-60.63 linux-tools-kvm - 6.8.0-60.63 linux-tools-laptop-23.10 - 6.8.0-60.63 linux-tools-oem-20.04 - 6.8.0-60.63 linux-tools-oem-20.04b - 6.8.0-60.63 linux-tools-oem-20.04c - 6.8.0-60.63 linux-tools-oem-20.04d - 6.8.0-60.63 linux-tools-oem-22.04 - 6.8.0-60.63 linux-tools-virtual - 6.8.0-60.63 linux-virtual - 6.8.0-60.63 No subscription required linux-buildinfo-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-buildinfo-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-cloud-tools-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-cloud-tools-lowlatency - 6.8.0-60.63.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-headers-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-headers-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-headers-lowlatency - 6.8.0-60.63.1 linux-headers-lowlatency-64k - 6.8.0-60.63.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-image-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-image-lowlatency - 6.8.0-60.63.1 linux-image-lowlatency-64k - 6.8.0-60.63.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-unsigned-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-image-unsigned-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-lowlatency - 6.8.0-60.63.1 linux-lowlatency-64k - 6.8.0-60.63.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-lowlatency-cloud-tools-6.8.0-60 - 6.8.0-60.63.1 linux-lowlatency-headers-6.8.0-60 - 6.8.0-60.63.1 linux-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-lowlatency-lib-rust-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-lowlatency-tools-6.8.0-60 - 6.8.0-60.63.1 linux-modules-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-modules-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-modules-iwlwifi-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-modules-iwlwifi-lowlatency - 6.8.0-60.63.1 linux-tools-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-tools-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-tools-lowlatency - 6.8.0-60.63.1 linux-tools-lowlatency-64k - 6.8.0-60.63.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 No subscription required
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21938
CVE-2025-21971
USN-7513-2 -- Linux kernel (Real-time) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56372, CVE-2025-21639, CVE-2024-57897, CVE-2024-56770, CVE-2024-57898, CVE-2025-21655, CVE-2024-56667, CVE-2024-41013, CVE-2024-57888, CVE-2025-21658, CVE-2024-57911, CVE-2024-56654, CVE-2024-57904, CVE-2024-56664, CVE-2024-57806, CVE-2024-56758, CVE-2024-57912, CVE-2025-21649, CVE-2024-56369, CVE-2025-21656, CVE-2025-21643, CVE-2024-57884, CVE-2025-21640, CVE-2024-56769, CVE-2024-57939, CVE-2025-21635, CVE-2024-57902, CVE-2024-36476, CVE-2025-21646, CVE-2024-57887, CVE-2024-57882, CVE-2024-57792, CVE-2024-56759, CVE-2024-57901, CVE-2024-56764, CVE-2025-21654, CVE-2024-57899, CVE-2025-21664, CVE-2024-56715, CVE-2024-56760, CVE-2024-57926, CVE-2024-57938, CVE-2025-21637, CVE-2024-55881, CVE-2024-57916, CVE-2024-57908, CVE-2024-57910, CVE-2024-57892, CVE-2024-57890, CVE-2024-56662, CVE-2024-57793, CVE-2024-47408, CVE-2024-49568, CVE-2024-57946, CVE-2024-53690, CVE-2024-56716, CVE-2024-57801, CVE-2024-56670, CVE-2024-56709, CVE-2024-57885, CVE-2024-57791, CVE-2024-38608, CVE-2024-56763, CVE-2024-57906, CVE-2024-47736, CVE-2024-56761, CVE-2024-56659, CVE-2025-21636, CVE-2024-57913, CVE-2024-56710, CVE-2025-21660, CVE-2024-57945, CVE-2024-39282, CVE-2024-53687, CVE-2024-57907, CVE-2024-53179, CVE-2025-21659, CVE-2024-57805, CVE-2024-57889, CVE-2024-57940, CVE-2025-21645, CVE-2024-56660, CVE-2024-56718, CVE-2024-57802, CVE-2024-56767, CVE-2024-56717, CVE-2024-58087, CVE-2025-21647, CVE-2025-21650, CVE-2024-57895, CVE-2025-21632, CVE-2024-54193, CVE-2024-57893, CVE-2025-21652, CVE-2025-21634, CVE-2024-56652, CVE-2024-57929, CVE-2024-57804, CVE-2024-57925, CVE-2024-57932, CVE-2024-54683, CVE-2025-21663, CVE-2024-56665, CVE-2024-54455, CVE-2025-21642, CVE-2024-57931, CVE-2025-21971, CVE-2024-56656, CVE-2025-21651, CVE-2024-49571, CVE-2025-21631, CVE-2024-56675, CVE-2024-53125, CVE-2025-21938, CVE-2024-57879, CVE-2024-56657, CVE-2024-57807, CVE-2024-57841, CVE-2024-57903, CVE-2024-53685, CVE-2024-57896, CVE-2024-57900, CVE-2024-57883, CVE-2024-58237, CVE-2025-21638, CVE-2024-55639, CVE-2025-21653, CVE-2025-21648, CVE-2024-54460, CVE-2024-57933, CVE-2024-55916, CVE-2024-57917, CVE-2025-21662) Update Instructions: Run `sudo pro fix USN-7513-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1022-realtime - 6.8.1-1022.23 linux-cloud-tools-6.8.1-1022-realtime - 6.8.1-1022.23 linux-headers-6.8.1-1022-realtime - 6.8.1-1022.23 linux-headers-realtime - 6.8.1-1022.23 linux-image-6.8.1-1022-realtime - 6.8.1-1022.23 linux-image-realtime - 6.8.1-1022.23 linux-image-uc-6.8.1-1022-realtime - 6.8.1-1022.23 linux-image-uc-realtime - 6.8.1-1022.23 linux-image-unsigned-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-extra-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-iwlwifi-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-iwlwifi-realtime - 6.8.1-1022.23 linux-realtime - 6.8.1-1022.23 linux-realtime-cloud-tools-6.8.1-1022 - 6.8.1-1022.23 linux-realtime-headers-6.8.1-1022 - 6.8.1-1022.23 linux-realtime-tools-6.8.1-1022 - 6.8.1-1022.23 linux-tools-6.8.1-1022-realtime - 6.8.1-1022.23 linux-tools-realtime - 6.8.1-1022.23 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21938
CVE-2025-21971
USN-7513-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2025-21648, CVE-2025-21645, CVE-2024-56767, CVE-2025-21664, CVE-2025-21636, CVE-2024-57898, CVE-2024-56667, CVE-2024-57912, CVE-2024-47408, CVE-2024-56761, CVE-2024-56665, CVE-2024-57887, CVE-2024-54683, CVE-2024-56662, CVE-2024-57910, CVE-2024-38608, CVE-2024-56710, CVE-2025-21656, CVE-2024-57885, CVE-2024-53125, CVE-2024-56675, CVE-2024-57895, CVE-2024-56660, CVE-2025-21638, CVE-2024-57932, CVE-2024-57807, CVE-2024-56759, CVE-2024-57883, CVE-2025-21643, CVE-2024-54193, CVE-2024-57879, CVE-2024-54460, CVE-2024-41013, CVE-2024-56654, CVE-2024-55916, CVE-2024-57897, CVE-2024-58087, CVE-2024-57904, CVE-2024-57893, CVE-2025-21652, CVE-2024-57925, CVE-2024-47736, CVE-2024-57802, CVE-2024-49571, CVE-2024-57916, CVE-2024-57801, CVE-2025-21647, CVE-2024-56763, CVE-2024-57903, CVE-2024-57899, CVE-2024-57908, CVE-2024-57900, CVE-2024-57911, CVE-2024-57902, CVE-2024-57938, CVE-2024-56760, CVE-2025-21642, CVE-2025-21971, CVE-2024-57933, CVE-2024-57917, CVE-2024-53179, CVE-2024-57896, CVE-2024-57906, CVE-2024-56716, CVE-2024-39282, CVE-2024-57806, CVE-2025-21938, CVE-2024-55881, CVE-2024-57931, CVE-2024-56717, CVE-2024-56369, CVE-2025-21640, CVE-2024-57888, CVE-2024-57804, CVE-2024-57907, CVE-2024-53687, CVE-2024-57940, CVE-2024-57929, CVE-2025-21637, CVE-2024-57805, CVE-2024-56372, CVE-2025-21646, CVE-2024-57913, CVE-2024-57901, CVE-2024-57889, CVE-2024-56770, CVE-2024-57945, CVE-2024-56659, CVE-2024-57946, CVE-2024-57890, CVE-2024-36476, CVE-2024-57882, CVE-2024-53685, CVE-2024-57791, CVE-2024-55639, CVE-2024-56718, CVE-2024-57792, CVE-2025-21662, CVE-2024-57793, CVE-2024-54455, CVE-2025-21632, CVE-2024-56715, CVE-2024-56652, CVE-2024-57939, CVE-2024-56657, CVE-2025-21658, CVE-2025-21655, CVE-2025-21635, CVE-2024-56656, CVE-2025-21660, CVE-2025-21634, CVE-2025-21631, CVE-2024-57892, CVE-2024-57884, CVE-2024-58237, CVE-2025-21659, CVE-2024-57926, CVE-2024-53690, CVE-2025-21654, CVE-2024-57841, CVE-2025-21639, CVE-2025-21663, CVE-2024-56670, CVE-2024-56758, CVE-2024-56764, CVE-2024-56709, CVE-2024-49568, CVE-2024-56769, CVE-2025-21653, CVE-2025-21651, CVE-2025-21650, CVE-2024-56664, CVE-2025-21649) Update Instructions: Run `sudo pro fix USN-7513-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-oem - 6.8.0-1028.28 linux-headers-6.8.0-1028-oem - 6.8.0-1028.28 linux-headers-oem-24.04 - 6.8.0-1028.28 linux-headers-oem-24.04a - 6.8.0-1028.28 linux-image-6.8.0-1028-oem - 6.8.0-1028.28 linux-image-oem-24.04 - 6.8.0-1028.28 linux-image-oem-24.04a - 6.8.0-1028.28 linux-image-uc-6.8.0-1028-oem - 6.8.0-1028.28 linux-image-uc-oem-24.04 - 6.8.0-1028.28 linux-image-uc-oem-24.04a - 6.8.0-1028.28 linux-image-unsigned-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-ipu6-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-ipu6-oem-24.04 - 6.8.0-1028.28 linux-modules-ipu6-oem-24.04a - 6.8.0-1028.28 linux-modules-iwlwifi-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1028.28 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1028.28 linux-modules-usbio-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-usbio-oem-24.04 - 6.8.0-1028.28 linux-modules-usbio-oem-24.04a - 6.8.0-1028.28 linux-oem-24.04 - 6.8.0-1028.28 linux-oem-24.04a - 6.8.0-1028.28 linux-oem-6.8-headers-6.8.0-1028 - 6.8.0-1028.28 linux-oem-6.8-tools-6.8.0-1028 - 6.8.0-1028.28 linux-tools-6.8.0-1028-oem - 6.8.0-1028.28 linux-tools-oem-24.04 - 6.8.0-1028.28 linux-tools-oem-24.04a - 6.8.0-1028.28 No subscription required linux-azure-cloud-tools-6.8.0-1029 - 6.8.0-1029.34 linux-azure-fde-lts-24.04 - 6.8.0-1029.34 linux-azure-headers-6.8.0-1029 - 6.8.0-1029.34 linux-azure-lts-24.04 - 6.8.0-1029.34 linux-azure-tools-6.8.0-1029 - 6.8.0-1029.34 linux-buildinfo-6.8.0-1029-azure - 6.8.0-1029.34 linux-cloud-tools-6.8.0-1029-azure - 6.8.0-1029.34 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1029.34 linux-headers-6.8.0-1029-azure - 6.8.0-1029.34 linux-headers-azure-lts-24.04 - 6.8.0-1029.34 linux-image-6.8.0-1029-azure - 6.8.0-1029.34 linux-image-6.8.0-1029-azure-fde - 6.8.0-1029.34 linux-image-azure-fde-lts-24.04 - 6.8.0-1029.34 linux-image-azure-lts-24.04 - 6.8.0-1029.34 linux-image-unsigned-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-extra-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-extra-azure-lts-24.04 - 6.8.0-1029.34 linux-modules-involflt-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1029.34 linux-modules-iwlwifi-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1029.34 linux-tools-6.8.0-1029-azure - 6.8.0-1029.34 linux-tools-azure-lts-24.04 - 6.8.0-1029.34 No subscription required
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21938
CVE-2025-21971
USN-7514-1 -- Linux kernel (NVIDIA) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-57901, CVE-2024-57889, CVE-2024-53687, CVE-2024-57804, CVE-2024-56709, CVE-2025-21631, CVE-2024-57908, CVE-2025-21645, CVE-2024-47736, CVE-2024-57896, CVE-2024-38608, CVE-2025-21637, CVE-2024-57898, CVE-2024-53179, CVE-2024-56710, CVE-2024-57802, CVE-2025-21659, CVE-2024-57903, CVE-2024-56764, CVE-2024-57892, CVE-2024-56717, CVE-2024-57938, CVE-2024-55881, CVE-2024-56718, CVE-2025-21647, CVE-2024-39282, CVE-2024-57879, CVE-2025-21643, CVE-2024-57792, CVE-2024-56657, CVE-2024-53685, CVE-2024-54455, CVE-2024-56656, CVE-2025-21638, CVE-2024-57907, CVE-2024-54193, CVE-2024-57806, CVE-2025-21655, CVE-2024-56670, CVE-2024-57904, CVE-2024-56369, CVE-2024-57945, CVE-2024-56759, CVE-2024-56716, CVE-2025-21651, CVE-2024-57911, CVE-2024-56372, CVE-2024-36476, CVE-2024-57888, CVE-2024-41013, CVE-2024-57882, CVE-2025-21636, CVE-2025-21971, CVE-2024-57841, CVE-2024-56760, CVE-2024-57805, CVE-2024-56758, CVE-2025-21648, CVE-2024-57917, CVE-2024-57913, CVE-2025-21658, CVE-2024-57926, CVE-2024-57939, CVE-2024-57791, CVE-2024-57883, CVE-2024-58087, CVE-2024-56665, CVE-2024-57887, CVE-2025-21635, CVE-2024-56662, CVE-2024-57893, CVE-2024-57916, CVE-2024-56675, CVE-2024-56763, CVE-2024-56664, CVE-2024-53690, CVE-2025-21663, CVE-2024-56761, CVE-2024-57910, CVE-2025-21660, CVE-2024-57885, CVE-2024-57899, CVE-2025-21650, CVE-2025-21888, CVE-2024-57801, CVE-2024-58237, CVE-2024-56767, CVE-2024-57895, CVE-2024-57912, CVE-2024-56654, CVE-2025-21646, CVE-2024-54683, CVE-2024-57931, CVE-2024-49568, CVE-2025-21639, CVE-2025-21632, CVE-2024-56769, CVE-2024-57807, CVE-2025-21656, CVE-2024-55639, CVE-2024-56652, CVE-2024-57933, CVE-2024-57793, CVE-2025-21662, CVE-2024-57940, CVE-2024-56715, CVE-2024-57906, CVE-2024-57900, CVE-2024-56660, CVE-2024-57897, CVE-2024-49571, CVE-2024-57890, CVE-2025-21642, CVE-2025-21634, CVE-2025-21938, CVE-2024-57929, CVE-2025-21664, CVE-2024-53125, CVE-2024-54460, CVE-2024-57925, CVE-2025-21652, CVE-2025-21653, CVE-2024-55916, CVE-2024-47408, CVE-2024-57902, CVE-2025-21654, CVE-2025-21649, CVE-2024-56770, CVE-2024-57932, CVE-2024-57946, CVE-2025-21640, CVE-2024-57884, CVE-2024-56667, CVE-2024-56659) Update Instructions: Run `sudo pro fix USN-7514-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-buildinfo-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-cloud-tools-nvidia - 6.8.0-1028.31 linux-headers-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-headers-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-headers-nvidia - 6.8.0-1028.31 linux-headers-nvidia-64k - 6.8.0-1028.31 linux-image-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-image-nvidia - 6.8.0-1028.31 linux-image-nvidia-64k - 6.8.0-1028.31 linux-image-uc-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-uc-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-image-unsigned-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-unsigned-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-extra-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-nvidia-fs-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1028.31 linux-nvidia - 6.8.0-1028.31 linux-nvidia-64k - 6.8.0-1028.31 linux-nvidia-headers-6.8.0-1028 - 6.8.0-1028.31 linux-nvidia-tools-6.8.0-1028 - 6.8.0-1028.31 linux-tools-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-tools-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-tools-nvidia - 6.8.0-1028.31 linux-tools-nvidia-64k - 6.8.0-1028.31 No subscription required linux-buildinfo-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-buildinfo-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-headers-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-uc-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-uc-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-unsigned-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-unsigned-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-extra-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-nvidia-lowlatency - 6.8.0-1028.31.1 linux-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-nvidia-lowlatency-headers-6.8.0-1028 - 6.8.0-1028.31.1 linux-nvidia-lowlatency-tools-6.8.0-1028 - 6.8.0-1028.31.1 linux-tools-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-tools-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-tools-nvidia-lowlatency - 6.8.0-1028.31.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1028.31.1 No subscription required
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21888
CVE-2025-21938
CVE-2025-21971
USN-7515-1 -- Linux kernel (GKE) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2025-21660, CVE-2025-21659, CVE-2024-56718, CVE-2024-56675, CVE-2025-21631, CVE-2025-21664, CVE-2025-21655, CVE-2025-21662, CVE-2024-57804, CVE-2025-21656, CVE-2024-57910, CVE-2025-21647, CVE-2025-21634, CVE-2024-56716, CVE-2024-56709, CVE-2024-56770, CVE-2024-57888, CVE-2024-57793, CVE-2024-56670, CVE-2024-57931, CVE-2025-21640, CVE-2025-21648, CVE-2024-57913, CVE-2024-56710, CVE-2024-44964, CVE-2024-57911, CVE-2025-21654, CVE-2024-57890, CVE-2024-56654, CVE-2024-56767, CVE-2025-21650, CVE-2024-54460, CVE-2025-21635, CVE-2024-57791, CVE-2024-49568, CVE-2024-57879, CVE-2024-57929, CVE-2024-56715, CVE-2024-57899, CVE-2024-53687, CVE-2024-57900, CVE-2024-57903, CVE-2024-54455, CVE-2024-56763, CVE-2024-58087, CVE-2025-21638, CVE-2024-57892, CVE-2024-57884, CVE-2024-57792, CVE-2024-57904, CVE-2024-56759, CVE-2024-56659, CVE-2024-57885, CVE-2024-57889, CVE-2024-56657, CVE-2024-56667, CVE-2024-47408, CVE-2024-57805, CVE-2025-21637, CVE-2024-57893, CVE-2024-57946, CVE-2024-57806, CVE-2024-36476, CVE-2025-21646, CVE-2024-56369, CVE-2024-57917, CVE-2025-21649, CVE-2024-54193, CVE-2024-56717, CVE-2024-41013, CVE-2024-55916, CVE-2024-57933, CVE-2024-57907, CVE-2024-54683, CVE-2024-57887, CVE-2024-56760, CVE-2024-56652, CVE-2024-57940, CVE-2024-57906, CVE-2024-57939, CVE-2024-56372, CVE-2024-56665, CVE-2024-57925, CVE-2025-21938, CVE-2024-57895, CVE-2024-58237, CVE-2024-56664, CVE-2024-56660, CVE-2024-55639, CVE-2025-21632, CVE-2024-57841, CVE-2024-39282, CVE-2025-21651, CVE-2024-53125, CVE-2024-57807, CVE-2025-21643, CVE-2024-57883, CVE-2024-57898, CVE-2024-57897, CVE-2024-53179, CVE-2024-57932, CVE-2024-57916, CVE-2024-53685, CVE-2024-57908, CVE-2025-21652, CVE-2025-21658, CVE-2024-57926, CVE-2024-57801, CVE-2024-55881, CVE-2024-57901, CVE-2025-21653, CVE-2025-21642, CVE-2024-57882, CVE-2024-57912, CVE-2024-56662, CVE-2025-21639, CVE-2025-21971, CVE-2024-47736, CVE-2024-56761, CVE-2024-57945, CVE-2025-21663, CVE-2024-49571, CVE-2024-56758, CVE-2024-53690, CVE-2024-38608, CVE-2024-56656, CVE-2025-21645, CVE-2024-56764, CVE-2024-57896, CVE-2024-57938, CVE-2024-57902, CVE-2025-21636, CVE-2024-56769, CVE-2024-57802) Update Instructions: Run `sudo pro fix USN-7515-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-gke - 6.8.0-1025.29 linux-gke - 6.8.0-1025.29 linux-gke-headers-6.8.0-1025 - 6.8.0-1025.29 linux-gke-tools-6.8.0-1025 - 6.8.0-1025.29 linux-headers-6.8.0-1025-gke - 6.8.0-1025.29 linux-headers-gke - 6.8.0-1025.29 linux-image-6.8.0-1025-gke - 6.8.0-1025.29 linux-image-gke - 6.8.0-1025.29 linux-image-unsigned-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-extra-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-iwlwifi-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-iwlwifi-gke - 6.8.0-1025.29 linux-tools-6.8.0-1025-gke - 6.8.0-1025.29 linux-tools-gke - 6.8.0-1025.29 No subscription required
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-44964
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21938
CVE-2025-21971
USN-7515-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-57945, CVE-2024-56717, CVE-2024-57806, CVE-2025-21659, CVE-2024-57899, CVE-2024-57933, CVE-2024-56675, CVE-2025-21653, CVE-2024-44964, CVE-2024-57892, CVE-2024-56760, CVE-2024-57906, CVE-2024-57792, CVE-2024-54455, CVE-2025-21656, CVE-2024-56656, CVE-2024-57884, CVE-2025-21638, CVE-2024-56758, CVE-2025-21663, CVE-2024-54460, CVE-2024-57911, CVE-2024-55639, CVE-2024-57890, CVE-2025-21632, CVE-2024-57896, CVE-2024-56657, CVE-2024-54683, CVE-2025-21640, CVE-2025-21655, CVE-2025-21651, CVE-2024-57940, CVE-2024-56709, CVE-2024-57904, CVE-2024-47408, CVE-2024-53687, CVE-2025-21639, CVE-2024-57897, CVE-2025-21647, CVE-2024-57907, CVE-2025-21652, CVE-2024-56662, CVE-2024-57882, CVE-2024-56763, CVE-2025-21938, CVE-2024-57802, CVE-2024-36476, CVE-2024-57938, CVE-2024-57883, CVE-2024-57879, CVE-2024-57908, CVE-2024-57939, CVE-2024-57805, CVE-2024-56664, CVE-2024-56761, CVE-2024-56659, CVE-2025-21631, CVE-2024-56715, CVE-2025-21664, CVE-2024-56710, CVE-2024-56372, CVE-2024-57932, CVE-2024-57898, CVE-2025-21971, CVE-2024-47736, CVE-2024-41013, CVE-2024-57931, CVE-2024-56759, CVE-2024-57893, CVE-2025-21635, CVE-2024-53690, CVE-2024-57807, CVE-2024-56652, CVE-2024-57926, CVE-2024-57901, CVE-2024-57793, CVE-2024-39282, CVE-2024-49568, CVE-2024-57903, CVE-2024-57913, CVE-2024-53685, CVE-2024-57912, CVE-2024-56667, CVE-2024-54193, CVE-2024-55881, CVE-2024-56369, CVE-2024-58237, CVE-2024-57929, CVE-2024-53179, CVE-2024-56718, CVE-2025-21650, CVE-2025-21642, CVE-2025-21636, CVE-2025-21649, CVE-2025-21643, CVE-2024-58087, CVE-2025-21662, CVE-2025-21634, CVE-2024-57791, CVE-2025-21660, CVE-2024-49571, CVE-2024-56716, CVE-2024-57804, CVE-2024-57801, CVE-2025-21648, CVE-2024-56769, CVE-2025-21637, CVE-2024-57895, CVE-2024-57910, CVE-2024-57885, CVE-2024-56665, CVE-2024-55916, CVE-2024-57917, CVE-2024-57900, CVE-2024-57841, CVE-2025-21654, CVE-2024-56660, CVE-2025-21646, CVE-2024-57925, CVE-2024-57888, CVE-2025-21645, CVE-2025-21658, CVE-2024-57887, CVE-2024-56767, CVE-2024-57902, CVE-2024-56764, CVE-2024-57916, CVE-2024-56654, CVE-2024-57946, CVE-2024-56670, CVE-2024-56770, CVE-2024-57889, CVE-2024-38608, CVE-2024-53125) Update Instructions: Run `sudo pro fix USN-7515-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-cloud-tools-gkeop - 6.8.0-1012.14 linux-cloud-tools-gkeop-6.8 - 6.8.0-1012.14 linux-gkeop - 6.8.0-1012.14 linux-gkeop-6.8 - 6.8.0-1012.14 linux-gkeop-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-gkeop-headers-6.8.0-1012 - 6.8.0-1012.14 linux-gkeop-tools-6.8.0-1012 - 6.8.0-1012.14 linux-headers-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-headers-gkeop - 6.8.0-1012.14 linux-headers-gkeop-6.8 - 6.8.0-1012.14 linux-image-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-image-gkeop - 6.8.0-1012.14 linux-image-gkeop-6.8 - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-extra-gkeop - 6.8.0-1012.14 linux-modules-extra-gkeop-6.8 - 6.8.0-1012.14 linux-tools-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-tools-gkeop - 6.8.0-1012.14 linux-tools-gkeop-6.8 - 6.8.0-1012.14 No subscription required linux-buildinfo-6.8.0-1030-gcp - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-gcp-headers-6.8.0-1030 - 6.8.0-1030.32 linux-gcp-lts-24.04 - 6.8.0-1030.32 linux-gcp-tools-6.8.0-1030 - 6.8.0-1030.32 linux-headers-6.8.0-1030-gcp - 6.8.0-1030.32 linux-headers-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-headers-gcp-lts-24.04 - 6.8.0-1030.32 linux-image-6.8.0-1030-gcp - 6.8.0-1030.32 linux-image-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-image-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-image-gcp-lts-24.04 - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-gcp - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-6.8.0-1030-gcp - 6.8.0-1030.32 linux-modules-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-extra-6.8.0-1030-gcp - 6.8.0-1030.32 linux-modules-extra-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1030.32 linux-tools-6.8.0-1030-gcp - 6.8.0-1030.32 linux-tools-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-tools-gcp-lts-24.04 - 6.8.0-1030.32 No subscription required
Medium
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-44964
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21938
CVE-2025-21971
USN-7520-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
It was discovered that PostgreSQL incorrectly handled the GB18030 encoding. An attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7520-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.9-0ubuntu0.24.04.1 libecpg-dev - 16.9-0ubuntu0.24.04.1 libecpg6 - 16.9-0ubuntu0.24.04.1 libpgtypes3 - 16.9-0ubuntu0.24.04.1 libpq-dev - 16.9-0ubuntu0.24.04.1 libpq5 - 16.9-0ubuntu0.24.04.1 postgresql-16 - 16.9-0ubuntu0.24.04.1 postgresql-client-16 - 16.9-0ubuntu0.24.04.1 postgresql-doc-16 - 16.9-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.9-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.9-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.9-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.9-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2025-4207
USN-7521-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Serial ATA and Parallel ATA drivers; - Drivers core; - Network block device driver; - Bluetooth drivers; - Character device driver; - TPM device driver; - Clock framework and drivers; - Hardware crypto device drivers; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - NVIDIA Tegra memory controller driver; - Fastrpc Driver; - Network drivers; - Operating Performance Points (OPP) driver; - PCI subsystem; - x86 platform drivers; - PPS (Pulse Per Second) driver; - PTP clock framework; - Remote Processor subsystem; - Real Time Clock drivers; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Media staging drivers; - Trusted Execution Environment drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Framebuffer layer; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - BPF subsystem; - Timer subsystem; - KVM subsystem; - Networking core; - ptr_ring data structure definitions; - Networking subsytem; - Amateur Radio drivers; - L3 Master device support module; - TCP network protocol; - XFRM subsystem; - Tracing infrastructure; - io_uring subsystem; - Process Accounting mechanism; - Perf events; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Workqueue subsystem; - Memory management; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - Wireless networking; - Key management; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; - SoC audio core drivers; - SOF drivers; (CVE-2025-21737, CVE-2025-21711, CVE-2025-21987, CVE-2025-21848, CVE-2024-49570, CVE-2025-21762, CVE-2025-21738, CVE-2025-21712, CVE-2025-21719, CVE-2025-21870, CVE-2024-57984, CVE-2025-21815, CVE-2025-21744, CVE-2024-58058, CVE-2024-58078, CVE-2024-57990, CVE-2024-54458, CVE-2025-21899, CVE-2025-21814, CVE-2025-21746, CVE-2024-54456, CVE-2025-21739, CVE-2024-58057, CVE-2025-21855, CVE-2025-21758, CVE-2024-58006, CVE-2024-58007, CVE-2025-21720, CVE-2024-58090, CVE-2025-21852, CVE-2024-57982, CVE-2024-58013, CVE-2024-58082, CVE-2025-21825, CVE-2024-58072, CVE-2024-57996, CVE-2025-21787, CVE-2025-21742, CVE-2025-21705, CVE-2025-21829, CVE-2024-58060, CVE-2025-21811, CVE-2025-21900, CVE-2025-21853, CVE-2025-21809, CVE-2025-21938, CVE-2025-21728, CVE-2025-21785, CVE-2025-21732, CVE-2025-21888, CVE-2025-21768, CVE-2025-21875, CVE-2025-21721, CVE-2025-21766, CVE-2025-21892, CVE-2024-57953, CVE-2025-21772, CVE-2025-21735, CVE-2024-58017, CVE-2024-58086, CVE-2024-58084, CVE-2025-21761, CVE-2024-58008, CVE-2024-57988, CVE-2025-21874, CVE-2024-58011, CVE-2025-21706, CVE-2024-57999, CVE-2025-21858, CVE-2024-58061, CVE-2025-21727, CVE-2025-21780, CVE-2024-58051, CVE-2025-21791, CVE-2025-21788, CVE-2025-21786, CVE-2024-58012, CVE-2024-58010, CVE-2024-58001, CVE-2025-21844, CVE-2025-21708, CVE-2024-57834, CVE-2025-21873, CVE-2025-21704, CVE-2025-21765, CVE-2025-21839, CVE-2025-21723, CVE-2024-57974, CVE-2025-21876, CVE-2025-21782, CVE-2025-21866, CVE-2024-58076, CVE-2025-21724, CVE-2025-21895, CVE-2025-21770, CVE-2025-21835, CVE-2024-58052, CVE-2025-21827, CVE-2024-58069, CVE-2025-21828, CVE-2025-21734, CVE-2025-21781, CVE-2025-21971, CVE-2025-21775, CVE-2024-52559, CVE-2024-58020, CVE-2025-21713, CVE-2024-58068, CVE-2024-58018, CVE-2025-21806, CVE-2025-21802, CVE-2025-21731, CVE-2025-21741, CVE-2025-21847, CVE-2025-21767, CVE-2024-58003, CVE-2024-57993, CVE-2025-21725, CVE-2025-21796, CVE-2025-21764, CVE-2025-21862, CVE-2025-21733, CVE-2024-58075, CVE-2025-21808, CVE-2024-58034, CVE-2025-21707, CVE-2024-58080, CVE-2025-21784, CVE-2024-57994, CVE-2025-21890, CVE-2025-21754, CVE-2024-58063, CVE-2025-21826, CVE-2025-21821, CVE-2024-58079, CVE-2024-58056, CVE-2025-21798, CVE-2024-58077, CVE-2024-58019, CVE-2025-21748, CVE-2025-21759, CVE-2024-58004, CVE-2024-58081, CVE-2024-57978, CVE-2025-21865, CVE-2024-58002, CVE-2025-21810, CVE-2025-21743, CVE-2024-57989, CVE-2025-21718, CVE-2024-57987, CVE-2025-21877, CVE-2024-57973, CVE-2024-58070, CVE-2024-58071, CVE-2025-21891, CVE-2024-58021, CVE-2024-58016, CVE-2024-58005, CVE-2025-21760, CVE-2025-21883, CVE-2025-21878, CVE-2025-21881, CVE-2025-21838, CVE-2025-21783, CVE-2024-57986, CVE-2025-21793, CVE-2025-21859, CVE-2025-21792, CVE-2025-21820, CVE-2025-21799, CVE-2025-21750, CVE-2025-21795, CVE-2025-21854, CVE-2025-21836, CVE-2025-21726, CVE-2025-21846, CVE-2025-21864, CVE-2024-57977, CVE-2025-21887, CVE-2025-21710, CVE-2025-21889, CVE-2025-21812, CVE-2025-21773, CVE-2024-57852, CVE-2025-21856, CVE-2025-21871, CVE-2025-21763, CVE-2024-58064, CVE-2025-21804, CVE-2024-58055, CVE-2025-21898, CVE-2025-21776, CVE-2025-21869, CVE-2025-21745, CVE-2025-21736, CVE-2025-21716, CVE-2024-57981, CVE-2024-57979, CVE-2025-21715, CVE-2024-57998, CVE-2025-21790, CVE-2024-58085, CVE-2025-21749, CVE-2024-58088, CVE-2025-21753, CVE-2025-21851, CVE-2024-58054, CVE-2025-21830, CVE-2025-21832, CVE-2024-57980, CVE-2025-21885, CVE-2025-21863, CVE-2024-58053, CVE-2025-21823, CVE-2025-21857, CVE-2024-58083, CVE-2024-58014, CVE-2025-21816, CVE-2025-21779, CVE-2025-21872, CVE-2024-57997, CVE-2025-21867, CVE-2024-57985, CVE-2025-21831, CVE-2025-21801, CVE-2025-21868, CVE-2025-21849) Update Instructions: Run `sudo pro fix USN-7521-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1015.15~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-6.11-headers-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-6.11-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-edge - 6.11.0-1015.15~24.04.1 linux-azure-fde - 6.11.0-1015.15~24.04.1 linux-azure-fde-edge - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-cloud-tools-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-cloud-tools-azure - 6.11.0-1015.15~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1015.15~24.04.1 linux-gcp - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-headers-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-lib-rust-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-gcp-64k - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-headers-azure - 6.11.0-1015.15~24.04.1 linux-headers-azure-edge - 6.11.0-1015.15~24.04.1 linux-headers-gcp - 6.11.0-1015.15~24.04.1 linux-headers-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-azure-fde - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-azure - 6.11.0-1015.15~24.04.1 linux-image-azure-edge - 6.11.0-1015.15~24.04.1 linux-image-azure-fde - 6.11.0-1015.15~24.04.1 linux-image-azure-fde-edge - 6.11.0-1015.15~24.04.1 linux-image-gcp - 6.11.0-1015.15~24.04.1 linux-image-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-extra-azure - 6.11.0-1015.15~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1015.15~24.04.1 linux-modules-extra-gcp - 6.11.0-1015.15~24.04.1 linux-modules-extra-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-tools-azure - 6.11.0-1015.15~24.04.1 linux-tools-azure-edge - 6.11.0-1015.15~24.04.1 linux-tools-gcp - 6.11.0-1015.15~24.04.1 linux-tools-gcp-64k - 6.11.0-1015.15~24.04.1 No subscription required linux-buildinfo-6.11.0-1022-oem - 6.11.0-1022.22 linux-headers-6.11.0-1022-oem - 6.11.0-1022.22 linux-headers-oem-24.04b - 6.11.0-1022.22 linux-image-6.11.0-1022-oem - 6.11.0-1022.22 linux-image-oem-24.04b - 6.11.0-1022.22 linux-image-uc-6.11.0-1022-oem - 6.11.0-1022.22 linux-image-uc-oem-24.04b - 6.11.0-1022.22 linux-image-unsigned-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu6-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu6-oem-24.04b - 6.11.0-1022.22 linux-modules-ipu7-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu7-oem-24.04b - 6.11.0-1022.22 linux-modules-iwlwifi-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1022.22 linux-modules-usbio-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-usbio-oem-24.04b - 6.11.0-1022.22 linux-modules-vision-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-vision-oem-24.04b - 6.11.0-1022.22 linux-oem-24.04b - 6.11.0-1022.22 linux-oem-6.11-headers-6.11.0-1022 - 6.11.0-1022.22 linux-oem-6.11-tools-6.11.0-1022 - 6.11.0-1022.22 linux-tools-6.11.0-1022-oem - 6.11.0-1022.22 linux-tools-oem-24.04b - 6.11.0-1022.22 No subscription required linux-buildinfo-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-buildinfo-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-cloud-tools-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-headers-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-hwe-6.11-headers-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-hwe-6.11-tools-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-image-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-uc-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-uc-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-unsigned-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-unsigned-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-modules-extra-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu6-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-ipu7-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-usbio-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-vision-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-tools-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 No subscription required
Medium
CVE-2024-49570
CVE-2024-52559
CVE-2024-54456
CVE-2024-54458
CVE-2024-57834
CVE-2024-57852
CVE-2024-57953
CVE-2024-57973
CVE-2024-57974
CVE-2024-57977
CVE-2024-57978
CVE-2024-57979
CVE-2024-57980
CVE-2024-57981
CVE-2024-57982
CVE-2024-57984
CVE-2024-57985
CVE-2024-57986
CVE-2024-57987
CVE-2024-57988
CVE-2024-57989
CVE-2024-57990
CVE-2024-57993
CVE-2024-57994
CVE-2024-57996
CVE-2024-57997
CVE-2024-57998
CVE-2024-57999
CVE-2024-58001
CVE-2024-58002
CVE-2024-58003
CVE-2024-58004
CVE-2024-58005
CVE-2024-58006
CVE-2024-58007
CVE-2024-58008
CVE-2024-58010
CVE-2024-58011
CVE-2024-58012
CVE-2024-58013
CVE-2024-58014
CVE-2024-58016
CVE-2024-58017
CVE-2024-58018
CVE-2024-58019
CVE-2024-58020
CVE-2024-58021
CVE-2024-58034
CVE-2024-58051
CVE-2024-58052
CVE-2024-58053
CVE-2024-58054
CVE-2024-58055
CVE-2024-58056
CVE-2024-58057
CVE-2024-58058
CVE-2024-58060
CVE-2024-58061
CVE-2024-58063
CVE-2024-58064
CVE-2024-58068
CVE-2024-58069
CVE-2024-58070
CVE-2024-58071
CVE-2024-58072
CVE-2024-58075
CVE-2024-58076
CVE-2024-58077
CVE-2024-58078
CVE-2024-58079
CVE-2024-58080
CVE-2024-58081
CVE-2024-58082
CVE-2024-58083
CVE-2024-58084
CVE-2024-58085
CVE-2024-58086
CVE-2024-58088
CVE-2024-58090
CVE-2025-21704
CVE-2025-21705
CVE-2025-21706
CVE-2025-21707
CVE-2025-21708
CVE-2025-21710
CVE-2025-21711
CVE-2025-21712
CVE-2025-21713
CVE-2025-21715
CVE-2025-21716
CVE-2025-21718
CVE-2025-21719
CVE-2025-21720
CVE-2025-21721
CVE-2025-21723
CVE-2025-21724
CVE-2025-21725
CVE-2025-21726
CVE-2025-21727
CVE-2025-21728
CVE-2025-21731
CVE-2025-21732
CVE-2025-21733
CVE-2025-21734
CVE-2025-21735
CVE-2025-21736
CVE-2025-21737
CVE-2025-21738
CVE-2025-21739
CVE-2025-21741
CVE-2025-21742
CVE-2025-21743
CVE-2025-21744
CVE-2025-21745
CVE-2025-21746
CVE-2025-21748
CVE-2025-21749
CVE-2025-21750
CVE-2025-21753
CVE-2025-21754
CVE-2025-21758
CVE-2025-21759
CVE-2025-21760
CVE-2025-21761
CVE-2025-21762
CVE-2025-21763
CVE-2025-21764
CVE-2025-21765
CVE-2025-21766
CVE-2025-21767
CVE-2025-21768
CVE-2025-21770
CVE-2025-21772
CVE-2025-21773
CVE-2025-21775
CVE-2025-21776
CVE-2025-21779
CVE-2025-21780
CVE-2025-21781
CVE-2025-21782
CVE-2025-21783
CVE-2025-21784
CVE-2025-21785
CVE-2025-21786
CVE-2025-21787
CVE-2025-21788
CVE-2025-21790
CVE-2025-21791
CVE-2025-21792
CVE-2025-21793
CVE-2025-21795
CVE-2025-21796
CVE-2025-21798
CVE-2025-21799
CVE-2025-21801
CVE-2025-21802
CVE-2025-21804
CVE-2025-21806
CVE-2025-21808
CVE-2025-21809
CVE-2025-21810
CVE-2025-21811
CVE-2025-21812
CVE-2025-21814
CVE-2025-21815
CVE-2025-21816
CVE-2025-21820
CVE-2025-21821
CVE-2025-21823
CVE-2025-21825
CVE-2025-21826
CVE-2025-21827
CVE-2025-21828
CVE-2025-21829
CVE-2025-21830
CVE-2025-21831
CVE-2025-21832
CVE-2025-21835
CVE-2025-21836
CVE-2025-21838
CVE-2025-21839
CVE-2025-21844
CVE-2025-21846
CVE-2025-21847
CVE-2025-21848
CVE-2025-21849
CVE-2025-21851
CVE-2025-21852
CVE-2025-21853
CVE-2025-21854
CVE-2025-21855
CVE-2025-21856
CVE-2025-21857
CVE-2025-21858
CVE-2025-21859
CVE-2025-21862
CVE-2025-21863
CVE-2025-21864
CVE-2025-21865
CVE-2025-21866
CVE-2025-21867
CVE-2025-21868
CVE-2025-21869
CVE-2025-21870
CVE-2025-21871
CVE-2025-21872
CVE-2025-21873
CVE-2025-21874
CVE-2025-21875
CVE-2025-21876
CVE-2025-21877
CVE-2025-21878
CVE-2025-21881
CVE-2025-21883
CVE-2025-21885
CVE-2025-21887
CVE-2025-21888
CVE-2025-21889
CVE-2025-21890
CVE-2025-21891
CVE-2025-21892
CVE-2025-21895
CVE-2025-21898
CVE-2025-21899
CVE-2025-21900
CVE-2025-21938
CVE-2025-21971
CVE-2025-21987
USN-7521-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Serial ATA and Parallel ATA drivers; - Drivers core; - Network block device driver; - Bluetooth drivers; - Character device driver; - TPM device driver; - Clock framework and drivers; - Hardware crypto device drivers; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - NVIDIA Tegra memory controller driver; - Fastrpc Driver; - Network drivers; - Operating Performance Points (OPP) driver; - PCI subsystem; - x86 platform drivers; - PPS (Pulse Per Second) driver; - PTP clock framework; - Remote Processor subsystem; - Real Time Clock drivers; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Media staging drivers; - Trusted Execution Environment drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Framebuffer layer; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - BPF subsystem; - Timer subsystem; - KVM subsystem; - Networking core; - ptr_ring data structure definitions; - Networking subsytem; - Amateur Radio drivers; - L3 Master device support module; - TCP network protocol; - XFRM subsystem; - Tracing infrastructure; - io_uring subsystem; - Process Accounting mechanism; - Perf events; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Workqueue subsystem; - Memory management; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - Wireless networking; - Key management; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; - SoC audio core drivers; - SOF drivers; (CVE-2025-21799, CVE-2025-21765, CVE-2024-57834, CVE-2025-21971, CVE-2025-21855, CVE-2024-58019, CVE-2025-21987, CVE-2025-21754, CVE-2025-21779, CVE-2024-57986, CVE-2025-21809, CVE-2025-21887, CVE-2025-21744, CVE-2024-58014, CVE-2025-21892, CVE-2025-21848, CVE-2024-58051, CVE-2024-58085, CVE-2025-21862, CVE-2024-57981, CVE-2024-57987, CVE-2024-58053, CVE-2024-58063, CVE-2024-58079, CVE-2025-21875, CVE-2025-21715, CVE-2024-58004, CVE-2025-21857, CVE-2025-21856, CVE-2025-21938, CVE-2024-58082, CVE-2025-21815, CVE-2025-21864, CVE-2024-52559, CVE-2024-58078, CVE-2024-57989, CVE-2024-58001, CVE-2025-21889, CVE-2025-21739, CVE-2024-58005, CVE-2025-21829, CVE-2024-58069, CVE-2025-21712, CVE-2025-21846, CVE-2025-21883, CVE-2025-21852, CVE-2025-21808, CVE-2025-21900, CVE-2025-21888, CVE-2025-21784, CVE-2025-21838, CVE-2024-58054, CVE-2025-21781, CVE-2025-21737, CVE-2024-58013, CVE-2025-21885, CVE-2025-21877, CVE-2024-58010, CVE-2025-21844, CVE-2024-58012, CVE-2024-58083, CVE-2025-21783, CVE-2025-21798, CVE-2024-57973, CVE-2024-57982, CVE-2025-21708, CVE-2024-58003, CVE-2025-21786, CVE-2025-21750, CVE-2025-21870, CVE-2025-21745, CVE-2024-58081, CVE-2024-57979, CVE-2025-21718, CVE-2025-21816, CVE-2025-21868, CVE-2025-21731, CVE-2025-21814, CVE-2025-21826, CVE-2024-58006, CVE-2025-21821, CVE-2024-57852, CVE-2025-21746, CVE-2025-21874, CVE-2025-21866, CVE-2025-21770, CVE-2025-21899, CVE-2025-21804, CVE-2025-21723, CVE-2025-21742, CVE-2024-57988, CVE-2024-58034, CVE-2025-21733, CVE-2024-57980, CVE-2025-21782, CVE-2025-21711, CVE-2024-58090, CVE-2025-21761, CVE-2025-21851, CVE-2025-21828, CVE-2024-58068, CVE-2024-58018, CVE-2024-58064, CVE-2025-21869, CVE-2025-21772, CVE-2025-21758, CVE-2025-21793, CVE-2024-58017, CVE-2025-21835, CVE-2025-21775, CVE-2025-21719, CVE-2024-57998, CVE-2024-58002, CVE-2024-57993, CVE-2025-21847, CVE-2025-21760, CVE-2025-21796, CVE-2024-58075, CVE-2024-58077, CVE-2025-21773, CVE-2025-21790, CVE-2025-21872, CVE-2025-21895, CVE-2025-21732, CVE-2025-21871, CVE-2024-58058, CVE-2025-21749, CVE-2025-21830, CVE-2025-21704, CVE-2025-21720, CVE-2025-21748, CVE-2025-21726, CVE-2025-21801, CVE-2024-58076, CVE-2025-21881, CVE-2025-21831, CVE-2025-21724, CVE-2024-58086, CVE-2025-21812, CVE-2024-57985, CVE-2025-21795, CVE-2025-21725, CVE-2025-21762, CVE-2025-21788, CVE-2024-58080, CVE-2025-21839, CVE-2024-58057, CVE-2025-21706, CVE-2024-58011, CVE-2025-21832, CVE-2024-58061, CVE-2025-21710, CVE-2025-21734, CVE-2025-21836, CVE-2024-54456, CVE-2024-58008, CVE-2025-21743, CVE-2024-58071, CVE-2025-21707, CVE-2025-21791, CVE-2025-21767, CVE-2024-57974, CVE-2024-58021, CVE-2025-21849, CVE-2025-21827, CVE-2024-58084, CVE-2024-58016, CVE-2024-58072, CVE-2025-21802, CVE-2024-58055, CVE-2025-21853, CVE-2024-57997, CVE-2025-21858, CVE-2024-57999, CVE-2025-21780, CVE-2025-21876, CVE-2024-58088, CVE-2025-21820, CVE-2025-21753, CVE-2025-21766, CVE-2025-21768, CVE-2025-21898, CVE-2025-21785, CVE-2024-54458, CVE-2024-58060, CVE-2024-49570, CVE-2025-21759, CVE-2024-57953, CVE-2024-57977, CVE-2025-21810, CVE-2025-21735, CVE-2025-21728, CVE-2025-21865, CVE-2024-58007, CVE-2025-21776, CVE-2025-21859, CVE-2025-21721, CVE-2025-21823, CVE-2024-58070, CVE-2024-57996, CVE-2024-58056, CVE-2024-58020, CVE-2025-21741, CVE-2025-21806, CVE-2025-21727, CVE-2025-21736, CVE-2025-21787, CVE-2025-21763, CVE-2025-21811, CVE-2025-21873, CVE-2025-21890, CVE-2024-58052, CVE-2025-21705, CVE-2025-21713, CVE-2025-21863, CVE-2025-21716, CVE-2025-21825, CVE-2025-21792, CVE-2025-21854, CVE-2025-21738, CVE-2024-57990, CVE-2024-57994, CVE-2024-57978, CVE-2025-21878, CVE-2025-21867, CVE-2025-21764, CVE-2024-57984, CVE-2025-21891) Update Instructions: Run `sudo pro fix USN-7521-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-buildinfo-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-cloud-tools-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-headers-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-headers-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-image-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-unsigned-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-image-unsigned-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-modules-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-modules-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-tools-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-tools-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 No subscription required
Medium
CVE-2024-49570
CVE-2024-52559
CVE-2024-54456
CVE-2024-54458
CVE-2024-57834
CVE-2024-57852
CVE-2024-57953
CVE-2024-57973
CVE-2024-57974
CVE-2024-57977
CVE-2024-57978
CVE-2024-57979
CVE-2024-57980
CVE-2024-57981
CVE-2024-57982
CVE-2024-57984
CVE-2024-57985
CVE-2024-57986
CVE-2024-57987
CVE-2024-57988
CVE-2024-57989
CVE-2024-57990
CVE-2024-57993
CVE-2024-57994
CVE-2024-57996
CVE-2024-57997
CVE-2024-57998
CVE-2024-57999
CVE-2024-58001
CVE-2024-58002
CVE-2024-58003
CVE-2024-58004
CVE-2024-58005
CVE-2024-58006
CVE-2024-58007
CVE-2024-58008
CVE-2024-58010
CVE-2024-58011
CVE-2024-58012
CVE-2024-58013
CVE-2024-58014
CVE-2024-58016
CVE-2024-58017
CVE-2024-58018
CVE-2024-58019
CVE-2024-58020
CVE-2024-58021
CVE-2024-58034
CVE-2024-58051
CVE-2024-58052
CVE-2024-58053
CVE-2024-58054
CVE-2024-58055
CVE-2024-58056
CVE-2024-58057
CVE-2024-58058
CVE-2024-58060
CVE-2024-58061
CVE-2024-58063
CVE-2024-58064
CVE-2024-58068
CVE-2024-58069
CVE-2024-58070
CVE-2024-58071
CVE-2024-58072
CVE-2024-58075
CVE-2024-58076
CVE-2024-58077
CVE-2024-58078
CVE-2024-58079
CVE-2024-58080
CVE-2024-58081
CVE-2024-58082
CVE-2024-58083
CVE-2024-58084
CVE-2024-58085
CVE-2024-58086
CVE-2024-58088
CVE-2024-58090
CVE-2025-21704
CVE-2025-21705
CVE-2025-21706
CVE-2025-21707
CVE-2025-21708
CVE-2025-21710
CVE-2025-21711
CVE-2025-21712
CVE-2025-21713
CVE-2025-21715
CVE-2025-21716
CVE-2025-21718
CVE-2025-21719
CVE-2025-21720
CVE-2025-21721
CVE-2025-21723
CVE-2025-21724
CVE-2025-21725
CVE-2025-21726
CVE-2025-21727
CVE-2025-21728
CVE-2025-21731
CVE-2025-21732
CVE-2025-21733
CVE-2025-21734
CVE-2025-21735
CVE-2025-21736
CVE-2025-21737
CVE-2025-21738
CVE-2025-21739
CVE-2025-21741
CVE-2025-21742
CVE-2025-21743
CVE-2025-21744
CVE-2025-21745
CVE-2025-21746
CVE-2025-21748
CVE-2025-21749
CVE-2025-21750
CVE-2025-21753
CVE-2025-21754
CVE-2025-21758
CVE-2025-21759
CVE-2025-21760
CVE-2025-21761
CVE-2025-21762
CVE-2025-21763
CVE-2025-21764
CVE-2025-21765
CVE-2025-21766
CVE-2025-21767
CVE-2025-21768
CVE-2025-21770
CVE-2025-21772
CVE-2025-21773
CVE-2025-21775
CVE-2025-21776
CVE-2025-21779
CVE-2025-21780
CVE-2025-21781
CVE-2025-21782
CVE-2025-21783
CVE-2025-21784
CVE-2025-21785
CVE-2025-21786
CVE-2025-21787
CVE-2025-21788
CVE-2025-21790
CVE-2025-21791
CVE-2025-21792
CVE-2025-21793
CVE-2025-21795
CVE-2025-21796
CVE-2025-21798
CVE-2025-21799
CVE-2025-21801
CVE-2025-21802
CVE-2025-21804
CVE-2025-21806
CVE-2025-21808
CVE-2025-21809
CVE-2025-21810
CVE-2025-21811
CVE-2025-21812
CVE-2025-21814
CVE-2025-21815
CVE-2025-21816
CVE-2025-21820
CVE-2025-21821
CVE-2025-21823
CVE-2025-21825
CVE-2025-21826
CVE-2025-21827
CVE-2025-21828
CVE-2025-21829
CVE-2025-21830
CVE-2025-21831
CVE-2025-21832
CVE-2025-21835
CVE-2025-21836
CVE-2025-21838
CVE-2025-21839
CVE-2025-21844
CVE-2025-21846
CVE-2025-21847
CVE-2025-21848
CVE-2025-21849
CVE-2025-21851
CVE-2025-21852
CVE-2025-21853
CVE-2025-21854
CVE-2025-21855
CVE-2025-21856
CVE-2025-21857
CVE-2025-21858
CVE-2025-21859
CVE-2025-21862
CVE-2025-21863
CVE-2025-21864
CVE-2025-21865
CVE-2025-21866
CVE-2025-21867
CVE-2025-21868
CVE-2025-21869
CVE-2025-21870
CVE-2025-21871
CVE-2025-21872
CVE-2025-21873
CVE-2025-21874
CVE-2025-21875
CVE-2025-21876
CVE-2025-21877
CVE-2025-21878
CVE-2025-21881
CVE-2025-21883
CVE-2025-21885
CVE-2025-21887
CVE-2025-21888
CVE-2025-21889
CVE-2025-21890
CVE-2025-21891
CVE-2025-21892
CVE-2025-21895
CVE-2025-21898
CVE-2025-21899
CVE-2025-21900
CVE-2025-21938
CVE-2025-21971
CVE-2025-21987
USN-7522-1 -- Linux kernel (Azure, N-Series) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56653, CVE-2024-57932, CVE-2024-54455, CVE-2024-57938, CVE-2024-57896, CVE-2024-53179, CVE-2024-57903, CVE-2025-21640, CVE-2024-56654, CVE-2024-57906, CVE-2024-53690, CVE-2025-21648, CVE-2024-57913, CVE-2025-21655, CVE-2024-57907, CVE-2025-21634, CVE-2024-57926, CVE-2025-21659, CVE-2024-54460, CVE-2024-57898, CVE-2024-56769, CVE-2024-36476, CVE-2025-21938, CVE-2025-21637, CVE-2024-57888, CVE-2024-57901, CVE-2024-57887, CVE-2024-57940, CVE-2024-49571, CVE-2024-57889, CVE-2024-55639, CVE-2024-57899, CVE-2024-56759, CVE-2024-41013, CVE-2024-57895, CVE-2024-57933, CVE-2024-56662, CVE-2024-56767, CVE-2025-21639, CVE-2024-56715, CVE-2024-57883, CVE-2025-21636, CVE-2024-57931, CVE-2025-21642, CVE-2024-53685, CVE-2024-56659, CVE-2025-21971, CVE-2024-56716, CVE-2025-21652, CVE-2024-57792, CVE-2025-21638, CVE-2024-56764, CVE-2024-55916, CVE-2024-57916, CVE-2024-56718, CVE-2024-57929, CVE-2024-57900, CVE-2025-21660, CVE-2024-57879, CVE-2024-56758, CVE-2024-57908, CVE-2025-21664, CVE-2024-56652, CVE-2024-57882, CVE-2024-39282, CVE-2025-21663, CVE-2024-47736, CVE-2024-54193, CVE-2025-21650, CVE-2024-56665, CVE-2024-57793, CVE-2024-58087, CVE-2025-21658, CVE-2025-21643, CVE-2024-54683, CVE-2024-56667, CVE-2024-56664, CVE-2024-56770, CVE-2024-57946, CVE-2024-57904, CVE-2024-56709, CVE-2024-56369, CVE-2024-58237, CVE-2024-57885, CVE-2024-56763, CVE-2024-56657, CVE-2025-21645, CVE-2024-57893, CVE-2025-21631, CVE-2024-57791, CVE-2024-57910, CVE-2024-57902, CVE-2024-57806, CVE-2025-21656, CVE-2024-53125, CVE-2024-56761, CVE-2024-56717, CVE-2024-47408, CVE-2025-21654, CVE-2025-21649, CVE-2024-57807, CVE-2024-56675, CVE-2025-21653, CVE-2024-57897, CVE-2024-53687, CVE-2024-56760, CVE-2025-21635, CVE-2025-21632, CVE-2024-57890, CVE-2025-21647, CVE-2024-57917, CVE-2024-56372, CVE-2024-56656, CVE-2024-57912, CVE-2024-57841, CVE-2025-21953, CVE-2024-56710, CVE-2024-57884, CVE-2024-57804, CVE-2025-21888, CVE-2024-56660, CVE-2024-57805, CVE-2024-57801, CVE-2024-38608, CVE-2024-57945, CVE-2024-55881, CVE-2024-57802, CVE-2024-57892, CVE-2025-21646, CVE-2024-56670, CVE-2025-21651, CVE-2024-57939, CVE-2024-57925, CVE-2024-57911, CVE-2025-21662, CVE-2024-49568) Update Instructions: Run `sudo pro fix USN-7522-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-nvidia - 6.8.0-1016.17 linux-azure-nvidia-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-azure-nvidia-cloud-tools-common - 6.8.0-1016.17 linux-azure-nvidia-headers-6.8.0-1016 - 6.8.0-1016.17 linux-azure-nvidia-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-cloud-tools-azure-nvidia - 6.8.0-1016.17 linux-headers-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-headers-azure-nvidia - 6.8.0-1016.17 linux-image-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-image-azure-nvidia - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-extra-azure-nvidia - 6.8.0-1016.17 linux-tools-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-tools-azure-nvidia - 6.8.0-1016.17 No subscription required
High
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-47408
CVE-2024-47736
CVE-2024-49568
CVE-2024-49571
CVE-2024-53125
CVE-2024-53179
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56664
CVE-2024-56665
CVE-2024-56667
CVE-2024-56670
CVE-2024-56675
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57805
CVE-2024-57806
CVE-2024-57807
CVE-2024-57841
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21888
CVE-2025-21938
CVE-2025-21953
CVE-2025-21971
USN-7523-1 -- Linux kernel (Raspberry Pi Real-time) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Ublk userspace block driver; - Virtio block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - DMA engine subsystem; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - Microchip PCI driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - TDX Guest driver; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - VLANs driver; - Kernel Samepage Merging mechanism; - Memory management; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - LAPB network protocol; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Timer subsystem; - Workqueue subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - Packet sockets; - RDS protocol; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - SELinux security module; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-56566, CVE-2024-56631, CVE-2025-21756, CVE-2024-57841, CVE-2024-50270, CVE-2024-50104, CVE-2024-50143, CVE-2024-56756, CVE-2024-50295, CVE-2024-48873, CVE-2024-53229, CVE-2024-50051, CVE-2024-50125, CVE-2024-56761, CVE-2024-50223, CVE-2024-53687, CVE-2024-53094, CVE-2024-53131, CVE-2024-57933, CVE-2024-57884, CVE-2024-57917, CVE-2024-53210, CVE-2024-50245, CVE-2024-56679, CVE-2024-50258, CVE-2024-57902, CVE-2024-50236, CVE-2024-56607, CVE-2024-50209, CVE-2024-50184, CVE-2024-50127, CVE-2024-50010, CVE-2024-50185, CVE-2024-57900, CVE-2024-56739, CVE-2024-56643, CVE-2024-56675, CVE-2024-56689, CVE-2024-50135, CVE-2024-56688, CVE-2024-50153, CVE-2025-21635, CVE-2025-21632, CVE-2024-50072, CVE-2025-21646, CVE-2024-56727, CVE-2024-53058, CVE-2024-53107, CVE-2024-53166, CVE-2024-50019, CVE-2024-50242, CVE-2024-56755, CVE-2024-50301, CVE-2024-57801, CVE-2024-56716, CVE-2024-50023, CVE-2024-50288, CVE-2024-50078, CVE-2024-56572, CVE-2024-53158, CVE-2024-50075, CVE-2024-57912, CVE-2024-56759, CVE-2024-53155, CVE-2024-56584, CVE-2024-56672, CVE-2024-56590, CVE-2024-56658, CVE-2024-50235, CVE-2024-53160, CVE-2024-56622, CVE-2024-50130, CVE-2024-50265, CVE-2024-56579, CVE-2024-50292, CVE-2024-56728, CVE-2024-56543, CVE-2024-56722, CVE-2024-53197, CVE-2025-21645, CVE-2024-50138, CVE-2024-45828, CVE-2024-50208, CVE-2024-56724, CVE-2024-50304, CVE-2024-50195, CVE-2024-49571, CVE-2024-50263, CVE-2024-55881, CVE-2024-50220, CVE-2024-50044, CVE-2024-53237, CVE-2024-50278, CVE-2024-56557, CVE-2024-50068, CVE-2024-56574, CVE-2024-50180, CVE-2024-50065, CVE-2025-21642, CVE-2024-56565, CVE-2024-50189, CVE-2024-53228, CVE-2024-56752, CVE-2024-50169, CVE-2024-53198, CVE-2024-56532, CVE-2025-21659, CVE-2024-53223, CVE-2024-50084, CVE-2024-56582, CVE-2024-56632, CVE-2024-56709, CVE-2024-50134, CVE-2024-57945, CVE-2024-56546, CVE-2024-50056, CVE-2024-53059, CVE-2024-53171, CVE-2024-50080, CVE-2024-49899, CVE-2024-50090, CVE-2024-53184, CVE-2024-50131, CVE-2024-57926, CVE-2024-50225, CVE-2024-47809, CVE-2024-53180, CVE-2024-56372, CVE-2024-50137, CVE-2024-50192, CVE-2024-56642, CVE-2025-21637, CVE-2024-53219, CVE-2024-56650, CVE-2024-53090, CVE-2024-53148, CVE-2024-56785, CVE-2024-50230, CVE-2024-50275, CVE-2024-47141, CVE-2024-50022, CVE-2024-53142, CVE-2024-50059, CVE-2024-56765, CVE-2024-53046, CVE-2024-58087, CVE-2025-21664, CVE-2025-21658, CVE-2024-56569, CVE-2024-50110, CVE-2024-53161, CVE-2024-53150, CVE-2024-53140, CVE-2024-50069, CVE-2024-56594, CVE-2024-53181, CVE-2024-53178, CVE-2024-56652, CVE-2024-56708, CVE-2024-53174, CVE-2024-53072, CVE-2024-50290, CVE-2024-53162, CVE-2024-50029, CVE-2024-53179, CVE-2024-53079, CVE-2024-57906, CVE-2024-50035, CVE-2024-50224, CVE-2025-21649, CVE-2024-50163, CVE-2024-57882, CVE-2024-50024, CVE-2024-56550, CVE-2024-53690, CVE-2024-50203, CVE-2024-53195, CVE-2024-50118, CVE-2024-53175, CVE-2024-57908, CVE-2025-21701, CVE-2024-47736, CVE-2024-53067, CVE-2024-53200, CVE-2024-50032, CVE-2024-50282, CVE-2024-50162, CVE-2024-53118, CVE-2024-56636, CVE-2024-56629, CVE-2024-50030, CVE-2024-56595, CVE-2024-56601, CVE-2024-57904, CVE-2024-53115, CVE-2024-50077, CVE-2024-56654, CVE-2024-50199, CVE-2024-56782, CVE-2024-50151, CVE-2024-50182, CVE-2024-53052, CVE-2024-53151, CVE-2024-57938, CVE-2024-53084, CVE-2024-50296, CVE-2024-53217, CVE-2024-57892, CVE-2024-50287, CVE-2024-53110, CVE-2024-56763, CVE-2024-50027, CVE-2024-50261, CVE-2024-50112, CVE-2024-56533, CVE-2024-56704, CVE-2024-47726, CVE-2024-50238, CVE-2024-57876, CVE-2024-50207, CVE-2024-50116, CVE-2024-50155, CVE-2024-53086, CVE-2024-50291, CVE-2025-21631, CVE-2024-56538, CVE-2024-56720, CVE-2024-53123, CVE-2024-58099, CVE-2024-56597, CVE-2024-53168, CVE-2024-57879, CVE-2022-49034, CVE-2024-56549, CVE-2024-41014, CVE-2024-53091, CVE-2024-56677, CVE-2024-53156, CVE-2024-50158, CVE-2024-50251, CVE-2024-56641, CVE-2024-56718, CVE-2024-57901, CVE-2024-56606, CVE-2024-50268, CVE-2024-48875, CVE-2024-50167, CVE-2024-50028, CVE-2024-50256, CVE-2024-50283, CVE-2024-53133, CVE-2024-50302, CVE-2024-56721, CVE-2024-53177, CVE-2024-57798, CVE-2024-53126, CVE-2024-56638, CVE-2024-50285, CVE-2024-53076, CVE-2024-53146, CVE-2024-56698, CVE-2025-21700, CVE-2024-56619, CVE-2024-50115, CVE-2024-53190, CVE-2024-54460, CVE-2024-50073, CVE-2024-56771, CVE-2024-56637, CVE-2024-50061, CVE-2024-55639, CVE-2024-56651, CVE-2024-50064, CVE-2024-53044, CVE-2024-53096, CVE-2024-56613, CVE-2024-56769, CVE-2024-57910, CVE-2024-41013, CVE-2024-50186, CVE-2024-50159, CVE-2024-56600, CVE-2024-56787, CVE-2024-57929, CVE-2024-56640, CVE-2025-21662, CVE-2024-53099, CVE-2024-56570, CVE-2024-53100, CVE-2024-50101, CVE-2024-50160, CVE-2024-50273, CVE-2024-47711, CVE-2024-50191, CVE-2024-56786, CVE-2024-50107, CVE-2024-53236, CVE-2024-56548, CVE-2024-56562, CVE-2024-50229, CVE-2024-56647, CVE-2024-53139, CVE-2024-48876, CVE-2024-57872, CVE-2024-53063, CVE-2024-53226, CVE-2024-56758, CVE-2024-50086, CVE-2024-53209, CVE-2024-50096, CVE-2024-56660, CVE-2024-57893, CVE-2024-53083, CVE-2024-57916, CVE-2024-50205, CVE-2024-50200, CVE-2024-53108, CVE-2024-50033, CVE-2024-50276, CVE-2024-56621, CVE-2024-56725, CVE-2024-56558, CVE-2024-57931, CVE-2024-50145, CVE-2024-56616, CVE-2024-53685, CVE-2024-53129, CVE-2025-21650, CVE-2025-21654, CVE-2024-50171, CVE-2024-56599, CVE-2024-50046, CVE-2024-56701, CVE-2024-47408, CVE-2025-21636, CVE-2024-50231, CVE-2024-50152, CVE-2024-50206, CVE-2024-50009, CVE-2024-53130, CVE-2024-57793, CVE-2024-57791, CVE-2024-50262, CVE-2024-56586, CVE-2024-57895, CVE-2024-57899, CVE-2024-56608, CVE-2024-50197, CVE-2024-56774, CVE-2024-53224, CVE-2024-53231, CVE-2024-50237, CVE-2024-50139, CVE-2024-50222, CVE-2024-50039, CVE-2024-53101, CVE-2024-56776, CVE-2024-56625, CVE-2024-53188, CVE-2024-50269, CVE-2024-50055, CVE-2024-50216, CVE-2024-56615, CVE-2024-56648, CVE-2024-50048, CVE-2024-57925, CVE-2024-50193, CVE-2024-56754, CVE-2025-21647, CVE-2024-50105, CVE-2024-49893, CVE-2024-53128, CVE-2024-49568, CVE-2024-56539, CVE-2024-50117, CVE-2024-53081, CVE-2024-50148, CVE-2024-56685, CVE-2024-50226, CVE-2024-56576, CVE-2024-56627, CVE-2024-50289, CVE-2025-21653, CVE-2024-53082, CVE-2024-56581, CVE-2024-53227, CVE-2024-56691, CVE-2024-56780, CVE-2024-50095, CVE-2024-50136, CVE-2024-50201, CVE-2024-55916, CVE-2024-56583, CVE-2024-53135, CVE-2024-53106, CVE-2024-57887, CVE-2024-57792, CVE-2024-48881, CVE-2024-56645, CVE-2024-53157, CVE-2024-53045, CVE-2024-53170, CVE-2024-50082, CVE-2024-56531, CVE-2024-53183, CVE-2024-53191, CVE-2024-53163, CVE-2025-21656, CVE-2024-50274, CVE-2025-21639, CVE-2025-21663, CVE-2024-50183, CVE-2024-50020, CVE-2024-56568, CVE-2024-56781, CVE-2024-50057, CVE-2024-56681, CVE-2024-50299, CVE-2024-53233, CVE-2024-53121, CVE-2024-53214, CVE-2024-56700, CVE-2024-50247, CVE-2024-56778, CVE-2024-50067, CVE-2024-56662, CVE-2024-56635, CVE-2024-53112, CVE-2024-56729, CVE-2024-56589, CVE-2024-53093, CVE-2024-50248, CVE-2024-53220, CVE-2025-21971, CVE-2024-52332, CVE-2024-38608, CVE-2024-50062, CVE-2024-53218, CVE-2024-56630, CVE-2024-49569, CVE-2024-56745, CVE-2024-56715, CVE-2024-56633, CVE-2024-53208, CVE-2024-56770, CVE-2024-50154, CVE-2024-56705, CVE-2024-50120, CVE-2024-57939, CVE-2024-57843, CVE-2024-56609, CVE-2024-56772, CVE-2024-50211, CVE-2024-57804, CVE-2024-57889, CVE-2024-56603, CVE-2024-53087, CVE-2024-53125, CVE-2024-53061, CVE-2025-21652, CVE-2024-50255, CVE-2024-56690, CVE-2025-21702, CVE-2024-53169, CVE-2024-50240, CVE-2024-56683, CVE-2024-49972, CVE-2025-21655, CVE-2024-57874, CVE-2024-53120, CVE-2024-57907, CVE-2024-56626, CVE-2024-56726, CVE-2024-56773, CVE-2024-49914, CVE-2024-42122, CVE-2024-53194, CVE-2024-49920, CVE-2024-56545, CVE-2024-56575, CVE-2024-56775, CVE-2024-53134, CVE-2024-56717, CVE-2024-53105, CVE-2024-57897, CVE-2024-50124, CVE-2024-50239, CVE-2024-50036, CVE-2024-50234, CVE-2025-21651, CVE-2024-56767, CVE-2024-53165, CVE-2024-53680, CVE-2024-41935, CVE-2024-50150, CVE-2024-53043, CVE-2024-56659, CVE-2024-50243, CVE-2024-56567, CVE-2024-50141, CVE-2024-50049, CVE-2024-53222, CVE-2024-53122, CVE-2024-50257, CVE-2024-50147, CVE-2024-53176, CVE-2024-53234, CVE-2024-53187, CVE-2024-50280, CVE-2024-50140, CVE-2024-57911, CVE-2024-50060, CVE-2024-56598, CVE-2024-50246, CVE-2024-53047, CVE-2024-56577, CVE-2024-57802, CVE-2024-53050, CVE-2024-50088, CVE-2024-56751, CVE-2024-56611, CVE-2024-53068, CVE-2025-21643, CVE-2024-50038, CVE-2024-36476, CVE-2024-56707, CVE-2024-50040, CVE-2024-53088, CVE-2024-50284, CVE-2024-53127, CVE-2024-50298, CVE-2024-56593, CVE-2024-57898, CVE-2024-57903, CVE-2024-56703, CVE-2024-56746, CVE-2024-56663, CVE-2024-53138, CVE-2024-56744, CVE-2024-50042, CVE-2024-57940, CVE-2024-56747, CVE-2024-56623, CVE-2024-56777, CVE-2024-41932, CVE-2024-47143, CVE-2024-50098, CVE-2024-53147, CVE-2024-53173, CVE-2024-50249, CVE-2024-49921, CVE-2024-56783, CVE-2024-50294, CVE-2024-53062, CVE-2024-57946, CVE-2024-56710, CVE-2025-21640, CVE-2024-53042, CVE-2024-56649, CVE-2024-50233, CVE-2024-50121, CVE-2024-53051, CVE-2024-57932, CVE-2025-21634, CVE-2024-56580, CVE-2024-56687, CVE-2024-53239, CVE-2024-56634, CVE-2024-56653, CVE-2024-53196, CVE-2024-56596, CVE-2024-50133, CVE-2024-50142, CVE-2024-50045, CVE-2024-53119, CVE-2024-56694, CVE-2024-50188, CVE-2024-50218, CVE-2024-50259, CVE-2024-56605, CVE-2024-53232, CVE-2024-57885, CVE-2024-50198, CVE-2024-56764, CVE-2025-21648, CVE-2024-50108, CVE-2024-56644, CVE-2024-50156, CVE-2024-53215, CVE-2024-50221, CVE-2024-56678, CVE-2024-50103, CVE-2024-53230, CVE-2024-50047, CVE-2024-50202, CVE-2024-56588, CVE-2024-53117, CVE-2024-53048, CVE-2025-21660, CVE-2024-53154, CVE-2024-50187, CVE-2024-50066, CVE-2024-50170, CVE-2024-56667, CVE-2024-56540, CVE-2024-53113, CVE-2024-44955, CVE-2024-53172, CVE-2024-49865, CVE-2024-56604, CVE-2025-21638, CVE-2024-50093, CVE-2024-50128, CVE-2024-50279, CVE-2024-50286, CVE-2024-50083, CVE-2024-56657, CVE-2024-53085, CVE-2024-50303, CVE-2024-57838, CVE-2024-56551, CVE-2024-54193, CVE-2024-57888, CVE-2024-50070, CVE-2024-50172, CVE-2024-57890, CVE-2024-56578, CVE-2025-21938, CVE-2024-53066, CVE-2024-54683, CVE-2024-50196, CVE-2024-49968, CVE-2024-56692, CVE-2024-50074, CVE-2024-53053, CVE-2024-50031, CVE-2024-54455, CVE-2024-57807, CVE-2024-56742, CVE-2024-57883, CVE-2024-50099, CVE-2024-50025, CVE-2024-57850, CVE-2024-57896, CVE-2024-56587, CVE-2024-50087, CVE-2024-57806, CVE-2024-53203, CVE-2024-50272, CVE-2024-50300, CVE-2024-50058, CVE-2024-50232, CVE-2024-50111, CVE-2024-50063, CVE-2024-50297, CVE-2024-50252, CVE-2024-53221, CVE-2024-50250, CVE-2024-50146, CVE-2024-53114, CVE-2024-50215, CVE-2024-50244, CVE-2024-56369, CVE-2024-53055, CVE-2024-49906, CVE-2024-43098, CVE-2024-58237, CVE-2024-57913, CVE-2024-50085, CVE-2024-53109, CVE-2024-56693, CVE-2025-21993, CVE-2024-53213, CVE-2024-50026, CVE-2024-53095, CVE-2024-56664, CVE-2024-53111, CVE-2024-50041, CVE-2024-50021, CVE-2024-39282, CVE-2024-56592, CVE-2024-56748, CVE-2024-47794, CVE-2024-50271, CVE-2024-56614, CVE-2024-50166, CVE-2024-57849, CVE-2024-56573, CVE-2024-56620, CVE-2024-50194, CVE-2024-56723, CVE-2024-50267, CVE-2024-56779, CVE-2024-56656, CVE-2024-50164, CVE-2024-50076, CVE-2024-50126, CVE-2025-21831, CVE-2024-56610, CVE-2024-56670, CVE-2024-53145, CVE-2024-56760, CVE-2024-56602, CVE-2024-53202) Update Instructions: Run `sudo pro fix USN-7523-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-headers-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-headers-raspi-realtime - 6.8.0-2023.24 linux-image-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-image-raspi-realtime - 6.8.0-2023.24 linux-modules-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-raspi-realtime - 6.8.0-2023.24 linux-raspi-realtime-headers-6.8.0-2023 - 6.8.0-2023.24 linux-raspi-realtime-tools-6.8.0-2023 - 6.8.0-2023.24 linux-tools-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-tools-raspi-realtime - 6.8.0-2023.24 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2022-49034
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-41014
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47408
CVE-2024-47711
CVE-2024-47726
CVE-2024-47736
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49568
CVE-2024-49569
CVE-2024-49571
CVE-2024-49865
CVE-2024-49893
CVE-2024-49899
CVE-2024-49906
CVE-2024-49914
CVE-2024-49920
CVE-2024-49921
CVE-2024-49968
CVE-2024-49972
CVE-2024-50009
CVE-2024-50010
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50032
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50051
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50067
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50117
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50134
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50148
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50169
CVE-2024-50170
CVE-2024-50171
CVE-2024-50172
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50229
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50233
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50249
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50302
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53061
CVE-2024-53062
CVE-2024-53063
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53125
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53140
CVE-2024-53142
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53156
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53165
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53170
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53179
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56658
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56667
CVE-2024-56670
CVE-2024-56672
CVE-2024-56675
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56765
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57798
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57806
CVE-2024-57807
CVE-2024-57838
CVE-2024-57841
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58099
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21938
CVE-2025-21971
CVE-2025-21993
USN-7524-1 -- Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Ublk userspace block driver; - Virtio block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - DMA engine subsystem; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - Microchip PCI driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - TDX Guest driver; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - VLANs driver; - Kernel Samepage Merging mechanism; - Memory management; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - LAPB network protocol; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Timer subsystem; - Workqueue subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - Packet sockets; - RDS protocol; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - SELinux security module; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2025-21651, CVE-2024-55881, CVE-2024-50223, CVE-2024-50033, CVE-2024-57907, CVE-2024-53233, CVE-2024-57798, CVE-2024-50262, CVE-2024-50265, CVE-2024-50197, CVE-2024-50066, CVE-2024-50271, CVE-2024-57892, CVE-2024-56767, CVE-2024-50237, CVE-2024-56638, CVE-2024-50084, CVE-2025-21638, CVE-2024-56630, CVE-2024-50193, CVE-2024-50093, CVE-2024-49914, CVE-2024-50221, CVE-2024-50202, CVE-2025-21659, CVE-2024-50009, CVE-2024-53059, CVE-2024-50206, CVE-2024-53239, CVE-2024-53219, CVE-2024-53139, CVE-2024-56752, CVE-2024-50125, CVE-2024-53226, CVE-2024-57940, CVE-2024-57925, CVE-2024-53081, CVE-2024-53053, CVE-2024-56627, CVE-2024-57882, CVE-2025-21645, CVE-2025-21642, CVE-2024-50120, CVE-2024-50240, CVE-2024-53168, CVE-2024-53178, CVE-2024-53166, CVE-2024-50030, CVE-2024-50299, CVE-2024-57926, CVE-2024-55916, CVE-2024-56593, CVE-2024-53083, CVE-2024-56641, CVE-2024-50049, CVE-2024-56761, CVE-2024-56664, CVE-2024-50242, CVE-2024-56589, CVE-2024-50248, CVE-2024-41013, CVE-2024-50291, CVE-2024-53061, CVE-2024-50105, CVE-2024-53171, CVE-2024-56568, CVE-2024-50133, CVE-2024-56594, CVE-2024-56582, CVE-2024-53100, CVE-2024-50021, CVE-2024-56603, CVE-2024-50055, CVE-2024-56637, CVE-2024-50273, CVE-2025-21660, CVE-2024-50083, CVE-2024-53063, CVE-2024-56599, CVE-2024-56783, CVE-2025-21993, CVE-2024-50019, CVE-2024-53177, CVE-2024-50038, CVE-2024-53113, CVE-2024-50215, CVE-2024-50036, CVE-2024-44955, CVE-2024-56602, CVE-2024-54193, CVE-2024-56685, CVE-2024-50137, CVE-2025-21640, CVE-2024-57838, CVE-2024-50024, CVE-2024-57849, CVE-2024-50304, CVE-2024-50263, CVE-2024-50048, CVE-2024-53176, CVE-2024-50191, CVE-2024-56781, CVE-2024-56548, CVE-2024-50278, CVE-2024-57906, CVE-2024-53114, CVE-2025-21646, CVE-2024-53196, CVE-2024-50135, CVE-2024-50286, CVE-2025-21831, CVE-2024-50163, CVE-2024-56694, CVE-2024-50023, CVE-2024-50031, CVE-2024-56709, CVE-2024-50107, CVE-2024-56672, CVE-2024-57887, CVE-2024-50162, CVE-2024-50207, CVE-2024-53155, CVE-2024-50095, CVE-2024-56703, CVE-2024-50268, CVE-2024-56607, CVE-2024-53115, CVE-2024-56739, CVE-2024-53091, CVE-2024-50086, CVE-2024-56580, CVE-2024-56572, CVE-2024-56693, CVE-2024-57904, CVE-2025-21938, CVE-2024-56698, CVE-2024-50039, CVE-2024-50233, CVE-2024-50282, CVE-2024-50251, CVE-2024-53184, CVE-2025-21700, CVE-2024-56565, CVE-2024-53117, CVE-2024-50288, CVE-2024-50171, CVE-2024-56583, CVE-2024-50115, CVE-2024-53687, CVE-2024-49568, CVE-2024-53047, CVE-2024-53150, CVE-2024-56549, CVE-2024-50148, CVE-2024-56679, CVE-2024-57888, CVE-2024-53680, CVE-2024-50155, CVE-2024-56751, CVE-2024-56610, CVE-2024-50272, CVE-2024-50182, CVE-2024-57916, CVE-2024-53237, CVE-2024-50211, CVE-2024-56605, CVE-2024-56601, CVE-2024-48873, CVE-2024-50166, CVE-2024-50085, CVE-2024-50108, CVE-2024-57792, CVE-2024-50224, CVE-2024-56779, CVE-2024-50068, CVE-2024-53151, CVE-2024-56657, CVE-2024-50026, CVE-2024-53138, CVE-2024-57896, CVE-2024-53222, CVE-2024-50164, CVE-2024-53230, CVE-2024-56614, CVE-2024-53089, CVE-2024-57895, CVE-2024-56755, CVE-2024-50096, CVE-2024-56645, CVE-2024-53162, CVE-2024-56566, CVE-2024-53086, CVE-2024-56718, CVE-2024-50062, CVE-2024-50065, CVE-2024-56763, CVE-2024-56538, CVE-2024-53127, CVE-2024-49893, CVE-2024-53087, CVE-2024-53058, CVE-2024-57945, CVE-2024-53174, CVE-2024-53096, CVE-2024-56546, CVE-2024-56754, CVE-2024-49865, CVE-2024-56635, CVE-2024-56539, CVE-2024-56551, CVE-2024-53044, CVE-2024-56700, CVE-2024-56787, CVE-2024-56586, CVE-2024-56687, CVE-2024-53236, CVE-2024-50058, CVE-2024-53146, CVE-2024-50269, CVE-2024-50056, CVE-2024-56608, CVE-2024-49899, CVE-2024-53099, CVE-2024-57902, CVE-2024-56656, CVE-2024-50126, CVE-2024-50274, CVE-2025-21654, CVE-2025-21971, CVE-2024-53130, CVE-2024-49571, CVE-2024-56742, CVE-2024-56613, CVE-2024-56575, CVE-2024-56540, CVE-2024-53194, CVE-2024-50044, CVE-2024-49906, CVE-2024-53163, CVE-2024-56774, CVE-2024-50143, CVE-2024-49968, CVE-2024-53202, CVE-2024-57876, CVE-2024-56650, CVE-2024-53685, CVE-2025-21656, CVE-2024-56648, CVE-2025-21636, CVE-2024-56782, CVE-2024-50198, CVE-2024-50110, CVE-2024-56775, CVE-2024-50239, CVE-2024-53156, CVE-2024-50045, CVE-2024-53045, CVE-2024-58237, CVE-2024-50167, CVE-2024-50060, CVE-2024-56372, CVE-2024-56756, CVE-2024-54455, CVE-2024-56543, CVE-2024-56772, CVE-2024-50131, CVE-2024-56616, CVE-2024-50185, CVE-2024-53154, CVE-2024-50138, CVE-2024-53111, CVE-2024-50025, CVE-2024-50156, CVE-2024-39282, CVE-2024-53140, CVE-2024-57872, CVE-2024-50077, CVE-2025-21652, CVE-2025-21655, CVE-2024-57901, CVE-2024-57791, CVE-2024-50259, CVE-2024-57890, CVE-2024-56770, CVE-2024-53170, CVE-2024-56705, CVE-2024-56597, CVE-2024-50047, CVE-2024-53101, CVE-2024-50128, CVE-2024-50287, CVE-2024-50186, CVE-2024-56745, CVE-2024-56720, CVE-2024-57889, CVE-2024-56590, CVE-2024-57807, CVE-2024-50158, CVE-2024-53198, CVE-2024-57843, CVE-2024-53095, CVE-2024-56678, CVE-2024-56758, CVE-2024-53120, CVE-2024-50087, CVE-2024-50147, CVE-2024-56652, CVE-2024-56692, CVE-2024-56724, CVE-2024-50226, CVE-2024-56609, CVE-2024-56769, CVE-2024-47408, CVE-2024-53187, CVE-2024-56596, CVE-2024-48875, CVE-2024-50236, CVE-2024-50284, CVE-2024-49921, CVE-2024-53229, CVE-2024-50256, CVE-2024-57946, CVE-2024-53175, CVE-2024-56619, CVE-2024-50257, CVE-2024-53210, CVE-2024-53203, CVE-2025-21658, CVE-2024-56683, CVE-2024-50302, CVE-2024-56570, CVE-2024-50187, CVE-2025-21650, CVE-2024-50082, CVE-2024-50194, CVE-2024-53072, CVE-2024-50118, CVE-2024-53043, CVE-2024-50160, CVE-2025-21635, CVE-2024-57900, CVE-2024-57879, CVE-2024-50294, CVE-2024-48876, CVE-2024-50250, CVE-2024-50220, CVE-2025-21648, CVE-2024-50032, CVE-2024-56765, CVE-2024-56369, CVE-2024-53109, CVE-2024-47143, CVE-2025-21643, CVE-2024-50261, CVE-2024-56558, CVE-2024-49920, CVE-2024-56689, CVE-2024-56647, CVE-2024-50290, CVE-2024-57908, CVE-2024-53209, CVE-2024-53220, CVE-2024-50073, CVE-2024-47711, CVE-2024-50183, CVE-2024-56690, CVE-2024-50067, CVE-2024-56778, CVE-2024-56622, CVE-2024-56729, CVE-2024-53157, CVE-2024-53213, CVE-2024-50130, CVE-2024-56629, CVE-2024-57885, CVE-2025-21637, CVE-2024-50078, CVE-2024-53224, CVE-2024-50116, CVE-2024-53068, CVE-2024-50300, CVE-2024-53084, CVE-2024-50099, CVE-2024-56723, CVE-2024-50230, CVE-2024-56636, CVE-2024-50252, CVE-2024-56587, CVE-2024-53131, CVE-2024-50046, CVE-2024-50200, CVE-2024-56588, CVE-2024-47726, CVE-2024-56615, CVE-2024-57917, CVE-2024-50063, CVE-2024-50246, CVE-2024-53055, CVE-2024-53133, CVE-2024-50205, CVE-2024-53076, CVE-2024-50283, CVE-2024-56660, CVE-2024-56707, CVE-2024-50180, CVE-2024-56746, CVE-2025-21756, CVE-2024-50127, CVE-2024-50145, CVE-2024-56625, CVE-2024-56760, CVE-2024-53121, CVE-2024-53122, CVE-2024-53062, CVE-2024-53046, CVE-2024-56764, CVE-2024-57801, CVE-2024-56728, CVE-2022-49034, CVE-2024-53094, CVE-2024-53147, CVE-2024-56776, CVE-2024-57898, CVE-2024-53148, CVE-2024-56704, CVE-2024-50035, CVE-2024-50152, CVE-2024-50169, CVE-2024-56600, CVE-2024-56681, CVE-2024-45828, CVE-2024-53052, CVE-2024-56574, CVE-2024-56531, CVE-2024-50303, CVE-2024-57897, CVE-2024-53123, CVE-2024-57874, CVE-2024-57939, CVE-2024-47141, CVE-2024-56659, CVE-2024-50069, CVE-2024-50141, CVE-2024-50201, CVE-2024-50270, CVE-2024-56621, CVE-2024-56606, CVE-2024-53129, CVE-2024-57938, CVE-2024-50203, CVE-2024-56708, CVE-2024-53197, CVE-2024-53208, CVE-2024-50028, CVE-2024-56677, CVE-2025-21664, CVE-2024-50121, CVE-2024-56644, CVE-2024-57804, CVE-2024-53145, CVE-2024-56780, CVE-2024-50112, CVE-2024-56759, CVE-2024-50192, CVE-2024-53181, CVE-2024-50170, CVE-2024-50080, CVE-2024-50238, CVE-2024-57912, CVE-2024-50222, CVE-2024-36476, CVE-2024-53107, CVE-2024-53119, CVE-2024-43098, CVE-2024-56604, CVE-2024-56567, CVE-2024-47736, CVE-2024-53180, CVE-2024-38608, CVE-2024-53227, CVE-2024-50136, CVE-2024-53105, CVE-2024-50225, CVE-2024-56649, CVE-2024-57899, CVE-2024-41014, CVE-2024-50188, CVE-2024-53160, CVE-2024-53183, CVE-2024-54460, CVE-2024-56725, CVE-2024-56642, CVE-2024-53223, CVE-2024-56631, CVE-2024-50134, CVE-2024-53135, CVE-2024-56573, CVE-2024-50104, CVE-2024-53126, CVE-2024-56667, CVE-2025-21662, CVE-2024-53221, CVE-2024-56786, CVE-2024-50040, CVE-2024-53085, CVE-2024-50051, CVE-2024-56721, CVE-2024-52332, CVE-2024-50075, CVE-2024-50208, CVE-2024-50209, CVE-2024-56710, CVE-2024-50296, CVE-2024-53066, CVE-2025-21701, CVE-2024-56584, CVE-2024-41932, CVE-2024-50059, CVE-2024-57911, CVE-2024-56785, CVE-2024-50216, CVE-2024-50249, CVE-2024-49569, CVE-2024-50098, CVE-2024-56777, CVE-2024-53093, CVE-2024-53067, CVE-2025-21634, CVE-2024-53190, CVE-2024-50199, CVE-2024-56577, CVE-2024-56653, CVE-2024-50027, CVE-2024-50285, CVE-2025-21632, CVE-2025-21702, CVE-2024-57893, CVE-2024-50235, CVE-2024-56658, CVE-2024-57802, CVE-2024-58087, CVE-2024-53112, CVE-2024-47809, CVE-2024-50111, CVE-2024-57910, CVE-2024-53142, CVE-2024-50196, CVE-2024-56578, CVE-2024-53200, CVE-2024-50276, CVE-2024-53188, CVE-2024-53048, CVE-2024-56771, CVE-2024-53228, CVE-2024-57850, CVE-2024-49972, CVE-2025-21647, CVE-2024-50072, CVE-2024-56701, CVE-2024-53232, CVE-2024-50088, CVE-2024-56557, CVE-2024-56632, CVE-2024-50142, CVE-2024-57806, CVE-2024-53051, CVE-2024-57931, CVE-2024-50103, CVE-2024-50258, CVE-2024-53172, CVE-2024-53106, CVE-2024-53158, CVE-2024-56595, CVE-2024-53108, CVE-2024-56626, CVE-2024-56691, CVE-2024-50289, CVE-2024-53217, CVE-2024-50234, CVE-2024-54683, CVE-2024-53042, CVE-2024-56675, CVE-2024-50195, CVE-2024-53195, CVE-2024-56654, CVE-2024-56715, CVE-2025-21639, CVE-2024-57913, CVE-2024-56717, CVE-2024-56651, CVE-2024-56688, CVE-2024-53128, CVE-2024-53169, CVE-2024-56620, CVE-2024-50189, CVE-2024-56550, CVE-2024-50244, CVE-2024-50279, CVE-2024-42122, CVE-2024-58099, CVE-2024-53179, CVE-2024-56532, CVE-2024-53215, CVE-2024-50232, CVE-2024-50029, CVE-2024-57933, CVE-2024-56662, CVE-2024-53690, CVE-2024-53134, CVE-2024-48881, CVE-2024-56727, CVE-2024-56576, CVE-2024-56670, CVE-2024-56598, CVE-2024-53161, CVE-2024-50061, CVE-2024-50117, CVE-2025-21653, CVE-2024-50101, CVE-2024-55639, CVE-2025-21649, CVE-2024-53231, CVE-2024-50041, CVE-2024-50231, CVE-2024-57932, CVE-2024-50076, CVE-2024-53165, CVE-2024-57793, CVE-2024-53082, CVE-2024-50020, CVE-2024-50267, CVE-2024-57883, CVE-2024-50298, CVE-2024-56643, CVE-2024-56640, CVE-2024-50074, CVE-2024-53125, CVE-2024-56748, CVE-2024-56634, CVE-2024-50064, CVE-2024-50172, CVE-2024-50255, CVE-2024-50042, CVE-2024-57929, CVE-2024-56773, CVE-2024-53214, CVE-2024-53110, CVE-2024-56569, CVE-2024-56581, CVE-2024-56716, CVE-2024-50090, CVE-2024-53218, CVE-2024-57884, CVE-2024-56611, CVE-2024-50243, CVE-2024-56545, CVE-2024-56623, CVE-2024-53173, CVE-2024-53090, CVE-2025-21631, CVE-2024-56744, CVE-2024-56722, CVE-2024-50297, CVE-2024-56726, CVE-2024-56592, CVE-2024-50275, CVE-2025-21663, CVE-2024-57841, CVE-2024-50150, CVE-2024-50301, CVE-2024-56579, CVE-2024-53088, CVE-2024-50153, CVE-2024-50280, CVE-2024-50124, CVE-2024-50229, CVE-2024-50146, CVE-2024-50057, CVE-2024-56562, CVE-2024-50070, CVE-2024-50218, CVE-2024-53118, CVE-2024-47794, CVE-2024-50295, CVE-2024-56747, CVE-2024-56663, CVE-2024-50292, CVE-2024-50140, CVE-2024-50154, CVE-2024-53050, CVE-2024-41935, CVE-2024-56533, CVE-2024-50139, CVE-2024-56633, CVE-2024-50184, CVE-2024-53191, CVE-2024-50022, CVE-2024-50010, CVE-2024-50245, CVE-2024-53079, CVE-2024-50151, CVE-2024-53234, CVE-2024-50247, CVE-2024-50159, CVE-2024-57903) Update Instructions: Run `sudo pro fix USN-7524-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-raspi - 6.8.0-1028.32 linux-headers-6.8.0-1028-raspi - 6.8.0-1028.32 linux-headers-raspi - 6.8.0-1028.32 linux-image-6.8.0-1028-raspi - 6.8.0-1028.32 linux-image-raspi - 6.8.0-1028.32 linux-modules-6.8.0-1028-raspi - 6.8.0-1028.32 linux-raspi - 6.8.0-1028.32 linux-raspi-headers-6.8.0-1028 - 6.8.0-1028.32 linux-raspi-tools-6.8.0-1028 - 6.8.0-1028.32 linux-tools-6.8.0-1028-raspi - 6.8.0-1028.32 linux-tools-raspi - 6.8.0-1028.32 No subscription required
High
CVE-2022-49034
CVE-2024-36476
CVE-2024-38608
CVE-2024-39282
CVE-2024-41013
CVE-2024-41014
CVE-2024-41932
CVE-2024-41935
CVE-2024-42122
CVE-2024-43098
CVE-2024-44955
CVE-2024-45828
CVE-2024-47141
CVE-2024-47143
CVE-2024-47408
CVE-2024-47711
CVE-2024-47726
CVE-2024-47736
CVE-2024-47794
CVE-2024-47809
CVE-2024-48873
CVE-2024-48875
CVE-2024-48876
CVE-2024-48881
CVE-2024-49568
CVE-2024-49569
CVE-2024-49571
CVE-2024-49865
CVE-2024-49893
CVE-2024-49899
CVE-2024-49906
CVE-2024-49914
CVE-2024-49920
CVE-2024-49921
CVE-2024-49968
CVE-2024-49972
CVE-2024-50009
CVE-2024-50010
CVE-2024-50019
CVE-2024-50020
CVE-2024-50021
CVE-2024-50022
CVE-2024-50023
CVE-2024-50024
CVE-2024-50025
CVE-2024-50026
CVE-2024-50027
CVE-2024-50028
CVE-2024-50029
CVE-2024-50030
CVE-2024-50031
CVE-2024-50032
CVE-2024-50033
CVE-2024-50035
CVE-2024-50036
CVE-2024-50038
CVE-2024-50039
CVE-2024-50040
CVE-2024-50041
CVE-2024-50042
CVE-2024-50044
CVE-2024-50045
CVE-2024-50046
CVE-2024-50047
CVE-2024-50048
CVE-2024-50049
CVE-2024-50051
CVE-2024-50055
CVE-2024-50056
CVE-2024-50057
CVE-2024-50058
CVE-2024-50059
CVE-2024-50060
CVE-2024-50061
CVE-2024-50062
CVE-2024-50063
CVE-2024-50064
CVE-2024-50065
CVE-2024-50066
CVE-2024-50067
CVE-2024-50068
CVE-2024-50069
CVE-2024-50070
CVE-2024-50072
CVE-2024-50073
CVE-2024-50074
CVE-2024-50075
CVE-2024-50076
CVE-2024-50077
CVE-2024-50078
CVE-2024-50080
CVE-2024-50082
CVE-2024-50083
CVE-2024-50084
CVE-2024-50085
CVE-2024-50086
CVE-2024-50087
CVE-2024-50088
CVE-2024-50090
CVE-2024-50093
CVE-2024-50095
CVE-2024-50096
CVE-2024-50098
CVE-2024-50099
CVE-2024-50101
CVE-2024-50103
CVE-2024-50104
CVE-2024-50105
CVE-2024-50107
CVE-2024-50108
CVE-2024-50110
CVE-2024-50111
CVE-2024-50112
CVE-2024-50115
CVE-2024-50116
CVE-2024-50117
CVE-2024-50118
CVE-2024-50120
CVE-2024-50121
CVE-2024-50124
CVE-2024-50125
CVE-2024-50126
CVE-2024-50127
CVE-2024-50128
CVE-2024-50130
CVE-2024-50131
CVE-2024-50133
CVE-2024-50134
CVE-2024-50135
CVE-2024-50136
CVE-2024-50137
CVE-2024-50138
CVE-2024-50139
CVE-2024-50140
CVE-2024-50141
CVE-2024-50142
CVE-2024-50143
CVE-2024-50145
CVE-2024-50146
CVE-2024-50147
CVE-2024-50148
CVE-2024-50150
CVE-2024-50151
CVE-2024-50152
CVE-2024-50153
CVE-2024-50154
CVE-2024-50155
CVE-2024-50156
CVE-2024-50158
CVE-2024-50159
CVE-2024-50160
CVE-2024-50162
CVE-2024-50163
CVE-2024-50164
CVE-2024-50166
CVE-2024-50167
CVE-2024-50169
CVE-2024-50170
CVE-2024-50171
CVE-2024-50172
CVE-2024-50180
CVE-2024-50182
CVE-2024-50183
CVE-2024-50184
CVE-2024-50185
CVE-2024-50186
CVE-2024-50187
CVE-2024-50188
CVE-2024-50189
CVE-2024-50191
CVE-2024-50192
CVE-2024-50193
CVE-2024-50194
CVE-2024-50195
CVE-2024-50196
CVE-2024-50197
CVE-2024-50198
CVE-2024-50199
CVE-2024-50200
CVE-2024-50201
CVE-2024-50202
CVE-2024-50203
CVE-2024-50205
CVE-2024-50206
CVE-2024-50207
CVE-2024-50208
CVE-2024-50209
CVE-2024-50211
CVE-2024-50215
CVE-2024-50216
CVE-2024-50218
CVE-2024-50220
CVE-2024-50221
CVE-2024-50222
CVE-2024-50223
CVE-2024-50224
CVE-2024-50225
CVE-2024-50226
CVE-2024-50229
CVE-2024-50230
CVE-2024-50231
CVE-2024-50232
CVE-2024-50233
CVE-2024-50234
CVE-2024-50235
CVE-2024-50236
CVE-2024-50237
CVE-2024-50238
CVE-2024-50239
CVE-2024-50240
CVE-2024-50242
CVE-2024-50243
CVE-2024-50244
CVE-2024-50245
CVE-2024-50246
CVE-2024-50247
CVE-2024-50248
CVE-2024-50249
CVE-2024-50250
CVE-2024-50251
CVE-2024-50252
CVE-2024-50255
CVE-2024-50256
CVE-2024-50257
CVE-2024-50258
CVE-2024-50259
CVE-2024-50261
CVE-2024-50262
CVE-2024-50263
CVE-2024-50265
CVE-2024-50267
CVE-2024-50268
CVE-2024-50269
CVE-2024-50270
CVE-2024-50271
CVE-2024-50272
CVE-2024-50273
CVE-2024-50274
CVE-2024-50275
CVE-2024-50276
CVE-2024-50278
CVE-2024-50279
CVE-2024-50280
CVE-2024-50282
CVE-2024-50283
CVE-2024-50284
CVE-2024-50285
CVE-2024-50286
CVE-2024-50287
CVE-2024-50288
CVE-2024-50289
CVE-2024-50290
CVE-2024-50291
CVE-2024-50292
CVE-2024-50294
CVE-2024-50295
CVE-2024-50296
CVE-2024-50297
CVE-2024-50298
CVE-2024-50299
CVE-2024-50300
CVE-2024-50301
CVE-2024-50302
CVE-2024-50303
CVE-2024-50304
CVE-2024-52332
CVE-2024-53042
CVE-2024-53043
CVE-2024-53044
CVE-2024-53045
CVE-2024-53046
CVE-2024-53047
CVE-2024-53048
CVE-2024-53050
CVE-2024-53051
CVE-2024-53052
CVE-2024-53053
CVE-2024-53055
CVE-2024-53058
CVE-2024-53059
CVE-2024-53061
CVE-2024-53062
CVE-2024-53063
CVE-2024-53066
CVE-2024-53067
CVE-2024-53068
CVE-2024-53072
CVE-2024-53076
CVE-2024-53079
CVE-2024-53081
CVE-2024-53082
CVE-2024-53083
CVE-2024-53084
CVE-2024-53085
CVE-2024-53086
CVE-2024-53087
CVE-2024-53088
CVE-2024-53089
CVE-2024-53090
CVE-2024-53091
CVE-2024-53093
CVE-2024-53094
CVE-2024-53095
CVE-2024-53096
CVE-2024-53099
CVE-2024-53100
CVE-2024-53101
CVE-2024-53105
CVE-2024-53106
CVE-2024-53107
CVE-2024-53108
CVE-2024-53109
CVE-2024-53110
CVE-2024-53111
CVE-2024-53112
CVE-2024-53113
CVE-2024-53114
CVE-2024-53115
CVE-2024-53117
CVE-2024-53118
CVE-2024-53119
CVE-2024-53120
CVE-2024-53121
CVE-2024-53122
CVE-2024-53123
CVE-2024-53125
CVE-2024-53126
CVE-2024-53127
CVE-2024-53128
CVE-2024-53129
CVE-2024-53130
CVE-2024-53131
CVE-2024-53133
CVE-2024-53134
CVE-2024-53135
CVE-2024-53138
CVE-2024-53139
CVE-2024-53140
CVE-2024-53142
CVE-2024-53145
CVE-2024-53146
CVE-2024-53147
CVE-2024-53148
CVE-2024-53150
CVE-2024-53151
CVE-2024-53154
CVE-2024-53155
CVE-2024-53156
CVE-2024-53157
CVE-2024-53158
CVE-2024-53160
CVE-2024-53161
CVE-2024-53162
CVE-2024-53163
CVE-2024-53165
CVE-2024-53166
CVE-2024-53168
CVE-2024-53169
CVE-2024-53170
CVE-2024-53171
CVE-2024-53172
CVE-2024-53173
CVE-2024-53174
CVE-2024-53175
CVE-2024-53176
CVE-2024-53177
CVE-2024-53178
CVE-2024-53179
CVE-2024-53180
CVE-2024-53181
CVE-2024-53183
CVE-2024-53184
CVE-2024-53187
CVE-2024-53188
CVE-2024-53190
CVE-2024-53191
CVE-2024-53194
CVE-2024-53195
CVE-2024-53196
CVE-2024-53197
CVE-2024-53198
CVE-2024-53200
CVE-2024-53202
CVE-2024-53203
CVE-2024-53208
CVE-2024-53209
CVE-2024-53210
CVE-2024-53213
CVE-2024-53214
CVE-2024-53215
CVE-2024-53217
CVE-2024-53218
CVE-2024-53219
CVE-2024-53220
CVE-2024-53221
CVE-2024-53222
CVE-2024-53223
CVE-2024-53224
CVE-2024-53226
CVE-2024-53227
CVE-2024-53228
CVE-2024-53229
CVE-2024-53230
CVE-2024-53231
CVE-2024-53232
CVE-2024-53233
CVE-2024-53234
CVE-2024-53236
CVE-2024-53237
CVE-2024-53239
CVE-2024-53680
CVE-2024-53685
CVE-2024-53687
CVE-2024-53690
CVE-2024-54193
CVE-2024-54455
CVE-2024-54460
CVE-2024-54683
CVE-2024-55639
CVE-2024-55881
CVE-2024-55916
CVE-2024-56369
CVE-2024-56372
CVE-2024-56531
CVE-2024-56532
CVE-2024-56533
CVE-2024-56538
CVE-2024-56539
CVE-2024-56540
CVE-2024-56543
CVE-2024-56545
CVE-2024-56546
CVE-2024-56548
CVE-2024-56549
CVE-2024-56550
CVE-2024-56551
CVE-2024-56557
CVE-2024-56558
CVE-2024-56562
CVE-2024-56565
CVE-2024-56566
CVE-2024-56567
CVE-2024-56568
CVE-2024-56569
CVE-2024-56570
CVE-2024-56572
CVE-2024-56573
CVE-2024-56574
CVE-2024-56575
CVE-2024-56576
CVE-2024-56577
CVE-2024-56578
CVE-2024-56579
CVE-2024-56580
CVE-2024-56581
CVE-2024-56582
CVE-2024-56583
CVE-2024-56584
CVE-2024-56586
CVE-2024-56587
CVE-2024-56588
CVE-2024-56589
CVE-2024-56590
CVE-2024-56592
CVE-2024-56593
CVE-2024-56594
CVE-2024-56595
CVE-2024-56596
CVE-2024-56597
CVE-2024-56598
CVE-2024-56599
CVE-2024-56600
CVE-2024-56601
CVE-2024-56602
CVE-2024-56603
CVE-2024-56604
CVE-2024-56605
CVE-2024-56606
CVE-2024-56607
CVE-2024-56608
CVE-2024-56609
CVE-2024-56610
CVE-2024-56611
CVE-2024-56613
CVE-2024-56614
CVE-2024-56615
CVE-2024-56616
CVE-2024-56619
CVE-2024-56620
CVE-2024-56621
CVE-2024-56622
CVE-2024-56623
CVE-2024-56625
CVE-2024-56626
CVE-2024-56627
CVE-2024-56629
CVE-2024-56630
CVE-2024-56631
CVE-2024-56632
CVE-2024-56633
CVE-2024-56634
CVE-2024-56635
CVE-2024-56636
CVE-2024-56637
CVE-2024-56638
CVE-2024-56640
CVE-2024-56641
CVE-2024-56642
CVE-2024-56643
CVE-2024-56644
CVE-2024-56645
CVE-2024-56647
CVE-2024-56648
CVE-2024-56649
CVE-2024-56650
CVE-2024-56651
CVE-2024-56652
CVE-2024-56653
CVE-2024-56654
CVE-2024-56656
CVE-2024-56657
CVE-2024-56658
CVE-2024-56659
CVE-2024-56660
CVE-2024-56662
CVE-2024-56663
CVE-2024-56664
CVE-2024-56667
CVE-2024-56670
CVE-2024-56672
CVE-2024-56675
CVE-2024-56677
CVE-2024-56678
CVE-2024-56679
CVE-2024-56681
CVE-2024-56683
CVE-2024-56685
CVE-2024-56687
CVE-2024-56688
CVE-2024-56689
CVE-2024-56690
CVE-2024-56691
CVE-2024-56692
CVE-2024-56693
CVE-2024-56694
CVE-2024-56698
CVE-2024-56700
CVE-2024-56701
CVE-2024-56703
CVE-2024-56704
CVE-2024-56705
CVE-2024-56707
CVE-2024-56708
CVE-2024-56709
CVE-2024-56710
CVE-2024-56715
CVE-2024-56716
CVE-2024-56717
CVE-2024-56718
CVE-2024-56720
CVE-2024-56721
CVE-2024-56722
CVE-2024-56723
CVE-2024-56724
CVE-2024-56725
CVE-2024-56726
CVE-2024-56727
CVE-2024-56728
CVE-2024-56729
CVE-2024-56739
CVE-2024-56742
CVE-2024-56744
CVE-2024-56745
CVE-2024-56746
CVE-2024-56747
CVE-2024-56748
CVE-2024-56751
CVE-2024-56752
CVE-2024-56754
CVE-2024-56755
CVE-2024-56756
CVE-2024-56758
CVE-2024-56759
CVE-2024-56760
CVE-2024-56761
CVE-2024-56763
CVE-2024-56764
CVE-2024-56765
CVE-2024-56767
CVE-2024-56769
CVE-2024-56770
CVE-2024-56771
CVE-2024-56772
CVE-2024-56773
CVE-2024-56774
CVE-2024-56775
CVE-2024-56776
CVE-2024-56777
CVE-2024-56778
CVE-2024-56779
CVE-2024-56780
CVE-2024-56781
CVE-2024-56782
CVE-2024-56783
CVE-2024-56785
CVE-2024-56786
CVE-2024-56787
CVE-2024-57791
CVE-2024-57792
CVE-2024-57793
CVE-2024-57798
CVE-2024-57801
CVE-2024-57802
CVE-2024-57804
CVE-2024-57806
CVE-2024-57807
CVE-2024-57838
CVE-2024-57841
CVE-2024-57843
CVE-2024-57849
CVE-2024-57850
CVE-2024-57872
CVE-2024-57874
CVE-2024-57876
CVE-2024-57879
CVE-2024-57882
CVE-2024-57883
CVE-2024-57884
CVE-2024-57885
CVE-2024-57887
CVE-2024-57888
CVE-2024-57889
CVE-2024-57890
CVE-2024-57892
CVE-2024-57893
CVE-2024-57895
CVE-2024-57896
CVE-2024-57897
CVE-2024-57898
CVE-2024-57899
CVE-2024-57900
CVE-2024-57901
CVE-2024-57902
CVE-2024-57903
CVE-2024-57904
CVE-2024-57906
CVE-2024-57907
CVE-2024-57908
CVE-2024-57910
CVE-2024-57911
CVE-2024-57912
CVE-2024-57913
CVE-2024-57916
CVE-2024-57917
CVE-2024-57925
CVE-2024-57926
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57933
CVE-2024-57938
CVE-2024-57939
CVE-2024-57940
CVE-2024-57945
CVE-2024-57946
CVE-2024-58087
CVE-2024-58099
CVE-2024-58237
CVE-2025-21631
CVE-2025-21632
CVE-2025-21634
CVE-2025-21635
CVE-2025-21636
CVE-2025-21637
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21642
CVE-2025-21643
CVE-2025-21645
CVE-2025-21646
CVE-2025-21647
CVE-2025-21648
CVE-2025-21649
CVE-2025-21650
CVE-2025-21651
CVE-2025-21652
CVE-2025-21653
CVE-2025-21654
CVE-2025-21655
CVE-2025-21656
CVE-2025-21658
CVE-2025-21659
CVE-2025-21660
CVE-2025-21662
CVE-2025-21663
CVE-2025-21664
CVE-2025-21700
CVE-2025-21701
CVE-2025-21702
CVE-2025-21756
CVE-2025-21831
CVE-2025-21938
CVE-2025-21971
CVE-2025-21993
USN-7525-1 -- Tomcat vulnerability
Ubuntu 24.04 LTS
It was discovered that Apache Tomcat incorrectly implemented partial PUT functionality by replacing path separators with dots in temporary files. A remote attacker could possibly use this issue to access sensitive files, inject malicious content, or execute remote code. Update Instructions: Run `sudo pro fix USN-7525-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat10-embed-java - 10.1.16-1ubuntu0.1~esm1 libtomcat10-java - 10.1.16-1ubuntu0.1~esm1 tomcat10 - 10.1.16-1ubuntu0.1~esm1 tomcat10-admin - 10.1.16-1ubuntu0.1~esm1 tomcat10-common - 10.1.16-1ubuntu0.1~esm1 tomcat10-docs - 10.1.16-1ubuntu0.1~esm1 tomcat10-examples - 10.1.16-1ubuntu0.1~esm1 tomcat10-user - 10.1.16-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2025-24813
USN-7525-2 -- Tomcat vulnerability
Ubuntu 24.04 LTS
USN-7525-1 fixed CVE-2025-24813 for tomcat9 in Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. This update fixes it for tomcat9 in Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.10. These versions include only the tomcat library (libtomcat9-java) and not the full tomcat server stack. Original advisory details: It was discovered that Apache Tomcat incorrectly implemented partial PUT functionality by replacing path separators with dots in temporary files. A remote attacker could possibly use this issue to access sensitive files, inject malicious content, or execute remote code. Update Instructions: Run `sudo pro fix USN-7525-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2025-24813
USN-7528-1 -- SQLite vulnerabilities
Ubuntu 24.04 LTS
It was discovered that SQLite incorrectly handled the concat_ws() function. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-29087, CVE-2025-3277) It was discovered that SQLite incorrectly handled certain argument values to sqlite3_db_config(). An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-29088) Update Instructions: Run `sudo pro fix USN-7528-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.45.1-1ubuntu2.3 libsqlite3-0 - 3.45.1-1ubuntu2.3 libsqlite3-dev - 3.45.1-1ubuntu2.3 libsqlite3-tcl - 3.45.1-1ubuntu2.3 sqlite3 - 3.45.1-1ubuntu2.3 sqlite3-doc - 3.45.1-1ubuntu2.3 sqlite3-tools - 3.45.1-1ubuntu2.3 No subscription required
Medium
CVE-2025-29087
CVE-2025-29088
CVE-2025-3277
USN-7532-1 -- GLib vulnerability
Ubuntu 24.04 LTS
It was discovered that Glib incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7532-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.4 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.4 gir1.2-glib-2.0 - 2.80.0-6ubuntu3.4 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.4 libgirepository-2.0-0 - 2.80.0-6ubuntu3.4 libgirepository-2.0-dev - 2.80.0-6ubuntu3.4 libglib2.0-0t64 - 2.80.0-6ubuntu3.4 libglib2.0-bin - 2.80.0-6ubuntu3.4 libglib2.0-data - 2.80.0-6ubuntu3.4 libglib2.0-dev - 2.80.0-6ubuntu3.4 libglib2.0-dev-bin - 2.80.0-6ubuntu3.4 libglib2.0-doc - 2.80.0-6ubuntu3.4 libglib2.0-tests - 2.80.0-6ubuntu3.4 No subscription required
Medium
CVE-2025-4373
USN-7535-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
Sander Wiebing and Cristiano Giuffrida discovered that some Intel® Processors did not properly handle data in Shared Microarchitectural Structures during Transient Execution. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-28956) It was discovered that some Intel® Processors did not properly handle prediction calculations. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-43420, CVE-2024-45332, CVE-2025-20623) It was discovered that some Intel® Processors did not properly initialize resources in the branch prediction unit. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2025-20012, CVE-2025-24495) Michal Raviv and Jeff Gilbert discovered that some Intel® Processors did not properly handle resources and exceptions in the core management mechanism. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2025-20054, CVE-2025-20103) Update Instructions: Run `sudo pro fix USN-7535-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250512.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-28956
CVE-2024-43420
CVE-2024-45332
CVE-2025-20012
CVE-2025-20054
CVE-2025-20103
CVE-2025-20623
CVE-2025-24495
USN-7536-1 -- cifs-utils vulnerability
Ubuntu 24.04 LTS
It was discovered that cifs-utils incorrectly handled namespaces when obtaining Kerberos credentials. An attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7536-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cifs-utils - 2:7.0-2ubuntu0.1 No subscription required
Medium
CVE-2025-2312
USN-7537-1 -- net-tools vulnerability
Ubuntu 24.04 LTS
It was discovered that net-tools incorrectly handled certain inputs. An attacker could possible use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7537-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: net-tools - 2.10-0.1ubuntu4.1 No subscription required
Medium
CVE-2025-46836
USN-7537-2 -- net-tools regression
Ubuntu 24.04 LTS
USN-7537-1 fixed a vulnerability in net-tools that caused a regression. This update fixes the problem. Original advisory details: It was discovered that net-tools incorrectly handled certain inputs. An attacker could possible use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7537-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: net-tools - 2.10-0.1ubuntu4.4 No subscription required
None
https://launchpad.net/bugs/2111912
USN-7538-1 -- FFmpeg vulnerabilities
Ubuntu 24.04 LTS
Simcha Kosman discovered that FFmpeg did not correctly handle certain return values. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-0518) It was discovered that FFmpeg did not correctly handle certain memory operations. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.10. (CVE-2025-1816) It was discovered that FFmpeg contained a reachable assertion, which could lead to a failure when processing certain AAC files. If a user or automated system were tricked into opening a specially crafted AAC file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-22919) It was discovered that FFmpeg did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 and Ubuntu 25.04. (CVE-2025-22921) It was discovered that FFmpeg did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10 and Ubuntu 25.04. (CVE-2025-25473) Update Instructions: Run `sudo pro fix USN-7538-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm3 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm3 libavcodec-dev - 7:6.1.1-3ubuntu5+esm3 libavcodec-extra - 7:6.1.1-3ubuntu5+esm3 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm3 libavcodec60 - 7:6.1.1-3ubuntu5+esm3 libavdevice-dev - 7:6.1.1-3ubuntu5+esm3 libavdevice60 - 7:6.1.1-3ubuntu5+esm3 libavfilter-dev - 7:6.1.1-3ubuntu5+esm3 libavfilter-extra - 7:6.1.1-3ubuntu5+esm3 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm3 libavfilter9 - 7:6.1.1-3ubuntu5+esm3 libavformat-dev - 7:6.1.1-3ubuntu5+esm3 libavformat-extra - 7:6.1.1-3ubuntu5+esm3 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm3 libavformat60 - 7:6.1.1-3ubuntu5+esm3 libavutil-dev - 7:6.1.1-3ubuntu5+esm3 libavutil58 - 7:6.1.1-3ubuntu5+esm3 libpostproc-dev - 7:6.1.1-3ubuntu5+esm3 libpostproc57 - 7:6.1.1-3ubuntu5+esm3 libswresample-dev - 7:6.1.1-3ubuntu5+esm3 libswresample4 - 7:6.1.1-3ubuntu5+esm3 libswscale-dev - 7:6.1.1-3ubuntu5+esm3 libswscale7 - 7:6.1.1-3ubuntu5+esm3 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2025-22919
CVE-2025-0518
CVE-2025-22921
CVE-2025-25473
CVE-2025-1816
USN-7542-1 -- Kerberos vulnerability
Ubuntu 24.04 LTS
It was discovered that Kerberos allowed the usage of weak cryptographic standards. An attacker could possibly use this issue to expose sensitive information. This update introduces the allow_rc4 and allow_des3 configuration options, and disables the usage of RC4 and 3DES ciphers by default. Users are advised to discontinue their usage and upgrade to stronger encryption protocols. If the use of the insecure RC4 and 3DES algorithms is necessary, they can be enabled with the aforementioned configuration options. Update Instructions: Run `sudo pro fix USN-7542-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.6 krb5-doc - 1.20.1-6ubuntu2.6 krb5-gss-samples - 1.20.1-6ubuntu2.6 krb5-k5tls - 1.20.1-6ubuntu2.6 krb5-kdc - 1.20.1-6ubuntu2.6 krb5-kdc-ldap - 1.20.1-6ubuntu2.6 krb5-kpropd - 1.20.1-6ubuntu2.6 krb5-locales - 1.20.1-6ubuntu2.6 krb5-multidev - 1.20.1-6ubuntu2.6 krb5-otp - 1.20.1-6ubuntu2.6 krb5-pkinit - 1.20.1-6ubuntu2.6 krb5-user - 1.20.1-6ubuntu2.6 libgssapi-krb5-2 - 1.20.1-6ubuntu2.6 libgssrpc4t64 - 1.20.1-6ubuntu2.6 libk5crypto3 - 1.20.1-6ubuntu2.6 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.6 libkadm5srv-mit12 - 1.20.1-6ubuntu2.6 libkdb5-10t64 - 1.20.1-6ubuntu2.6 libkrad-dev - 1.20.1-6ubuntu2.6 libkrad0 - 1.20.1-6ubuntu2.6 libkrb5-3 - 1.20.1-6ubuntu2.6 libkrb5-dev - 1.20.1-6ubuntu2.6 libkrb5support0 - 1.20.1-6ubuntu2.6 No subscription required
Medium
CVE-2025-3576
USN-7543-1 -- libsoup vulnerabilities
Ubuntu 24.04 LTS
Jan Różański discovered that libsoup incorrectly handled certain headers when sending HTTP/2 requests over TLS. An attacker could possibly use this issue to cause a denial of service. This issue only affected libsoup3 in Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-32908) Jan Różański discovered that libsoup incorrectly parsed certain response headers. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-4476) Update Instructions: Run `sudo pro fix USN-7543-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.5 libsoup-2.4-1 - 2.74.3-6ubuntu1.5 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.5 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.5 libsoup2.4-common - 2.74.3-6ubuntu1.5 libsoup2.4-dev - 2.74.3-6ubuntu1.5 libsoup2.4-doc - 2.74.3-6ubuntu1.5 libsoup2.4-tests - 2.74.3-6ubuntu1.5 No subscription required gir1.2-soup-3.0 - 3.4.4-5ubuntu0.4 libsoup-3.0-0 - 3.4.4-5ubuntu0.4 libsoup-3.0-common - 3.4.4-5ubuntu0.4 libsoup-3.0-dev - 3.4.4-5ubuntu0.4 libsoup-3.0-doc - 3.4.4-5ubuntu0.4 libsoup-3.0-tests - 3.4.4-5ubuntu0.4 No subscription required
Medium
CVE-2025-4476
CVE-2025-32908
USN-7544-1 -- Setuptools vulnerability
Ubuntu 24.04 LTS
It was discovered that setuptools did not properly sanitize paths. An attacker could possibly use this issue to write files to arbitrary locations on the filesystem. Update Instructions: Run `sudo pro fix USN-7544-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.2 python3-pkg-resources - 68.1.2-2ubuntu1.2 python3-setuptools - 68.1.2-2ubuntu1.2 python3-setuptools-whl - 68.1.2-2ubuntu1.2 No subscription required
Medium
CVE-2025-47273
USN-7545-1 -- Apport vulnerability
Ubuntu 24.04 LTS
Qualys discovered that Apport incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to leak sensitive information. Update Instructions: Run `sudo pro fix USN-7545-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apport - 2.28.1-0ubuntu3.6 apport-core-dump-handler - 2.28.1-0ubuntu3.6 apport-gtk - 2.28.1-0ubuntu3.6 apport-kde - 2.28.1-0ubuntu3.6 apport-noui - 2.28.1-0ubuntu3.6 apport-retrace - 2.28.1-0ubuntu3.6 apport-valgrind - 2.28.1-0ubuntu3.6 dh-apport - 2.28.1-0ubuntu3.6 python3-apport - 2.28.1-0ubuntu3.6 python3-problem-report - 2.28.1-0ubuntu3.6 No subscription required
Medium
CVE-2025-5054
USN-7545-2 -- Apport regression
Ubuntu 24.04 LTS
USN-7545-1 fixed a vulnerability in Apport. The update introduced a regression that prevented core dumps from being generated inside containers. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Qualys discovered that Apport incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to leak sensitive information. Update Instructions: Run `sudo pro fix USN-7545-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apport - 2.28.1-0ubuntu3.7 apport-core-dump-handler - 2.28.1-0ubuntu3.7 apport-gtk - 2.28.1-0ubuntu3.7 apport-kde - 2.28.1-0ubuntu3.7 apport-noui - 2.28.1-0ubuntu3.7 apport-retrace - 2.28.1-0ubuntu3.7 apport-valgrind - 2.28.1-0ubuntu3.7 dh-apport - 2.28.1-0ubuntu3.7 python3-apport - 2.28.1-0ubuntu3.7 python3-problem-report - 2.28.1-0ubuntu3.7 No subscription required
None
https://launchpad.net/bugs/2112272
USN-7547-1 -- Tornado vulnerability
Ubuntu 24.04 LTS
It was discovered that Tornado inefficiently handled requests when parsing certain form data. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. This issue was only addressed in Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2025-47287) Update Instructions: Run `sudo pro fix USN-7547-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-tornado-doc - 6.4.0-1ubuntu0.2 python3-tornado - 6.4.0-1ubuntu0.2 No subscription required
Medium
CVE-2025-47287
USN-7548-1 -- MariaDB vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in MariaDB and this update includes a new upstream MariaDB version to fix these issues. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-7548-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmariadb-dev - 1:10.11.13-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.13-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.13-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.13-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.13-0ubuntu0.24.04.1 mariadb-client - 1:10.11.13-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.13-0ubuntu0.24.04.1 mariadb-common - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lzo - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.13-0ubuntu0.24.04.1 mariadb-test - 1:10.11.13-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.13-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2023-52969
CVE-2023-52970
CVE-2023-52971
CVE-2025-30693
CVE-2025-30722
USN-7549-1 -- Twig vulnerability
Ubuntu 24.04 LTS
It was discovered that Twig did not correctly handle securing user input. An attacker could possibly use this issue to cause Twig to expose sensitive information if it opened a specially crafted file. (CVE-2024-45411) Update Instructions: Run `sudo pro fix USN-7549-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-twig - 3.8.0-2ubuntu1 php-twig-cache-extra - 3.8.0-2ubuntu1 php-twig-cssinliner-extra - 3.8.0-2ubuntu1 php-twig-doc - 3.8.0-2ubuntu1 php-twig-extra-bundle - 3.8.0-2ubuntu1 php-twig-html-extra - 3.8.0-2ubuntu1 php-twig-inky-extra - 3.8.0-2ubuntu1 php-twig-intl-extra - 3.8.0-2ubuntu1 php-twig-markdown-extra - 3.8.0-2ubuntu1 php-twig-string-extra - 3.8.0-2ubuntu1 No subscription required
Medium
CVE-2024-45411
USN-7551-1 -- libvpx vulnerability
Ubuntu 24.04 LTS
It was discovered that libvpx did not properly manage memory. An attacker could possibly use this issue to cause applications using libvpx to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7551-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.2 libvpx-doc - 1.14.0-1ubuntu2.2 libvpx9 - 1.14.0-1ubuntu2.2 vpx-tools - 1.14.0-1ubuntu2.2 No subscription required
Medium
CVE-2025-5283
USN-7555-1 -- Django vulnerability
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain unescaped request paths. An attacker could possibly use this issue to perform a log injection. Update Instructions: Run `sudo pro fix USN-7555-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.8 python3-django - 3:4.2.11-1ubuntu1.8 No subscription required
Low
CVE-2025-48432
USN-7556-1 -- Bootstrap vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Bootstrap did not correctly sanitize certain input in the carousel component. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2024-6484, CVE-2024-6531) It was discovered that Bootstrap did not correctly sanitize certain input in the button plugin. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2024-6485) Update Instructions: Run `sudo pro fix USN-7556-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fonts-glyphicons-halflings - 1.009~3.4.1+dfsg-3+deb12u1build0.24.04.1 No subscription required libjs-bootstrap - 3.4.1+dfsg-3+deb12u1build0.24.04.1 No subscription required libjs-bootstrap4 - 4.6.1+dfsg1-4+deb12u1build0.24.04.1 No subscription required
Medium
CVE-2024-6484
CVE-2024-6531
CVE-2024-6485
USN-7558-1 -- GStreamer Bad Plugins vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the AV1 codec plugin in GStreamer could be made to write out of bounds. An attacker could possibly use this issue to cause applications using the plugin to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-50186, CVE-2024-0444) It was discovered that the H265 codec plugin in GStreamer could be made to write out of bounds. An attacker could possibly use this issue to cause applications using the plugin to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-3887) Update Instructions: Run `sudo pro fix USN-7558-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gst-plugins-bad-1.0 - 1.24.2-1ubuntu4+esm1 gstreamer1.0-opencv - 1.24.2-1ubuntu4+esm1 gstreamer1.0-plugins-bad - 1.24.2-1ubuntu4+esm1 gstreamer1.0-plugins-bad-apps - 1.24.2-1ubuntu4+esm1 libgstreamer-opencv1.0-0 - 1.24.2-1ubuntu4+esm1 libgstreamer-plugins-bad1.0-0 - 1.24.2-1ubuntu4+esm1 libgstreamer-plugins-bad1.0-dev - 1.24.2-1ubuntu4+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
High
CVE-2023-50186
CVE-2024-0444
CVE-2025-3887
USN-7559-1 -- systemd vulnerability
Ubuntu 24.04 LTS
Qualys discovered that systemd incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to expose sensitive information. Update Instructions: Run `sudo pro fix USN-7559-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnss-myhostname - 255.4-1ubuntu8.8 libnss-mymachines - 255.4-1ubuntu8.8 libnss-resolve - 255.4-1ubuntu8.8 libnss-systemd - 255.4-1ubuntu8.8 libpam-systemd - 255.4-1ubuntu8.8 libsystemd-dev - 255.4-1ubuntu8.8 libsystemd-shared - 255.4-1ubuntu8.8 libsystemd0 - 255.4-1ubuntu8.8 libudev-dev - 255.4-1ubuntu8.8 libudev1 - 255.4-1ubuntu8.8 systemd - 255.4-1ubuntu8.8 systemd-boot - 255.4-1ubuntu8.8 systemd-boot-efi - 255.4-1ubuntu8.8 systemd-container - 255.4-1ubuntu8.8 systemd-coredump - 255.4-1ubuntu8.8 systemd-dev - 255.4-1ubuntu8.8 systemd-homed - 255.4-1ubuntu8.8 systemd-journal-remote - 255.4-1ubuntu8.8 systemd-oomd - 255.4-1ubuntu8.8 systemd-resolved - 255.4-1ubuntu8.8 systemd-standalone-sysusers - 255.4-1ubuntu8.8 systemd-standalone-tmpfiles - 255.4-1ubuntu8.8 systemd-sysv - 255.4-1ubuntu8.8 systemd-tests - 255.4-1ubuntu8.8 systemd-timesyncd - 255.4-1ubuntu8.8 systemd-ukify - 255.4-1ubuntu8.8 systemd-userdbd - 255.4-1ubuntu8.8 udev - 255.4-1ubuntu8.8 No subscription required
Medium
CVE-2025-4598
USN-7561-1 -- AMD Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that AMD Microcode incorrectly handled memory addresses. An attacker with local administrator privilege could possibly use this issue to cause loss of integrity of a confidential guest running under AMD SEV-SNP. (CVE-2023-20584, CVE-2023-31356) Josh Eads, Kristoffer Janke, Eduardo Nava, Tavis Ormandy and Matteo Rizzo discovered that AMD Microcode incorrectly verified signatures. An attacker with local administrator privilege could possibly use this issue to cause loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP. (CVE-2024-56161) Update Instructions: Run `sudo pro fix USN-7561-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amd64-microcode - 3.20250311.1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-56161
CVE-2023-20584
CVE-2023-31356
USN-7562-1 -- Tomcat vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Tomcat did not include the secure attribute for session cookies when using the RemoteIpFilter with requests from a reverse proxy. An attacker could possibly use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-28708) It was discovered that Tomcat incorrectly recycled certain objects, which could lead to information leaking from one request to the next. An attacker could potentially use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-42795) It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-45648) It was discovered that Tomcat incorrectly handled incomplete POST requests, which could cause error responses to contain data from previous requests. An attacker could potentially use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2024-21733) It was discovered that Tomcat incorrectly handled socket cleanup, which could lead to websocket connections staying open. An attacker could possibly use this issue to cause a denial of service. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS, tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-23672) It was discovered that Tomcat incorrectly handled HTTP/2 requests that exceeded configured header limits. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-24549) It was discovered that Tomcat incorrectly handled some cases of excessive HTTP headers when processing HTTP/2 streams. This led to miscounting of active streams and incorrect timeout handling. An attacker could possibly use this issue to cause connections to remain open indefinitely, leading to a denial of service. This issue was fixed for tomcat9 on Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-34750) It was discovered that Tomcat incorrectly handled TLS handshake processes under certain configurations. An attacker could possibly use this issue to cause a denial of service. This issue was fixed for tomcat9 on Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-38286) Update Instructions: Run `sudo pro fix USN-7562-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat10-embed-java - 10.1.16-1ubuntu0.1~esm2 libtomcat10-java - 10.1.16-1ubuntu0.1~esm2 tomcat10 - 10.1.16-1ubuntu0.1~esm2 tomcat10-admin - 10.1.16-1ubuntu0.1~esm2 tomcat10-common - 10.1.16-1ubuntu0.1~esm2 tomcat10-docs - 10.1.16-1ubuntu0.1~esm2 tomcat10-examples - 10.1.16-1ubuntu0.1~esm2 tomcat10-user - 10.1.16-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro libtomcat9-java - 9.0.70-2ubuntu0.1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-24549
CVE-2024-34750
CVE-2024-23672
CVE-2023-42795
CVE-2024-38286
CVE-2023-45648
CVE-2023-28708
CVE-2024-21733
LSN-0104-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-51781) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.(CVE-2024-26581) In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of- bounds read when parsing the netlink attributes.(CVE-2024-26597) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 104 Livepatch subscription required
High
CVE-2023-6270
CVE-2023-51781
CVE-2024-26597
CVE-2024-26581
LSN-0105-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that the netfilter connection tracker for netlink in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion).(CVE-2023-7192) In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.(CVE-2024-26642) In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that 'bytes_left' is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.(CVE-2024-26828) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 105 Livepatch subscription required
High
CVE-2023-7192
CVE-2024-26642
CVE-2023-6270
CVE-2024-26828
CVE-2024-26924
LSN-0106-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow timeout for anonymous sets Never used from userspace, disallow these parameters.(CVE-2023-52620) In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.(CVE-2024-26585) In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following: - side A configures the n_gsm in basic option mode - side B sends the header of a basic option mode frame with data length 1 - side A switches to advanced option mode - side B sends 2 data bytes which exceeds gsm->len Reason: gsm->len is not used in advanced option mode. - side A switches to basic option mode - side B keeps sending until gsm0_receive() writes past gsm->buf Reason: Neither gsm->state nor gsm->len have been reset after reconfiguration. Fix this by changing gsm->count to gsm->len comparison from equal to less than. Also add upper limit checks against the constant MAX_MRU in gsm0_receive() and gsm1_receive() to harden against memory corruption of gsm->len and gsm->mru. All other checks remain as we still need to limit the data according to the user configuration and actual payload size.(CVE-2024-36016) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 106 Livepatch subscription required
High
CVE-2024-36016
CVE-2024-26585
CVE-2023-52620
LSN-0107-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V count=2 inflight=1 close(V) // V count=1 inflight=1 // GC candidate condition met for u in gc_inflight_list: if (total_refs == inflight_refs) add u to gc_candidates // gc_candidates={L, V} for u in gc_candidates: scan_children(u, dec_inflight) // embryo (skb1) was not // reachable from L yet, so V's // inflight remains unchanged __skb_queue_tail(L, skb1) unix_state_unlock(L) for u in gc_candidates: if (u.inflight) scan_children(u, inc_inflight_move_tail) // V count=1 inflight=2 (!) If there is a GC-candidate listening socket, lock/unlock its state. This makes GC wait until the end of any ongoing connect() to that socket. After flipping the lock, a possibly SCM-laden embryo is already enqueued. And if there is another embryo coming, it can not possibly carry SCM_RIGHTS. At this point, unix_inflight() can not happen because unix_gc_lock is already taken. Inflight graph remains unaffected.)(CVE-2024-26923) In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previously a theoretical window where swapoff() could run and teardown a swap_info_struct while a call to free_swap_and_cache() was running in another thread. This could cause, amongst other bad possibilities, swap_page_trans_huge_swapped() (called by free_swap_and_cache()) to access the freed memory for swap_map. This is a theoretical problem and I haven't been able to provoke it from a test case. But there has been agreement based on code review that this is possible (see link below). Fix it by using get_swap_device()/put_swap_device(), which will stall swapoff(). There was an extra check in _swap_info_get() to confirm that the swap entry was not free. This isn't present in get_swap_device() because it doesn't make sense in general due to the race between getting the reference and swapoff. So I've added an equivalent check directly in free_swap_and_cache(). Details of how to provoke one possible issue (thanks to David Hildenbrand for deriving this): --8<----- __swap_entry_free() might be the last user and result in 'count == SWAP_HAS_CACHE'. swapoff->try_to_unuse() will stop as soon as soon as si->inuse_pages==0. So the question is: could someone reclaim the folio and turn si->inuse_pages==0, before we completed swap_page_trans_huge_swapped(). Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are still references by swap entries. Process 1 still references subpage 0 via swap entry. Process 2 still references subpage 1 via swap entry. Process 1 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE [then, preempted in the hypervisor etc.] Process 2 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls __try_to_reclaim_swap(). __try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()-> put_swap_folio()->free_swap_slot()->swapcache_free_entries()-> swap_entry_free()->swap_range_free()-> ... WRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries); What stops swapoff to succeed after process 2 reclaimed the swap cache but before process1 finished its call to swap_page_trans_huge_swapped()? --8<-----)(CVE-2024-26960) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge whether the sco disconnection is timeout. The sock will be deallocated later, but it is dereferenced again in sco_sock_timeout. As a result, the use-after-free bugs will happen. The root cause is shown below: Cleanup Thread Worker Thread sco_sock_release sco_sock_close __sco_sock_close sco_sock_set_timer schedule_delayed_work sco_sock_kill (wait a time) sock_put(sk) //FREE sco_sock_timeout sock_hold(sk) //USE The KASAN report triggered by POC is shown below: [ 95.890016 ================================================================== [ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0 [ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7 ... [ 95.890755] Workqueue: events sco_sock_timeout [ 95.890755] Call Trace: [ 95.890755] <TASK> [ 95.890755] dump_stack_lvl+0x45/0x110 [ 95.890755] print_address_description+0x78/0x390 [ 95.890755 print_report+0x11b/0x250 [ 95.890755] ? __virt_addr_valid+0xbe/0xf0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_report+0x139/0x170 [ 95.890755] ? update_load_avg+0xe5/0x9f0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_check_range+0x2c3/0x2e0 [ 95.890755] sco_sock_timeout+0x5e/0x1c0 [ 95.890755] process_one_work+0x561/0xc50 [ 95.890755 worker_thread+0xab2/0x13c0 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] kthread+0x279/0x300 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755] ret_from_fork+0x34/0x60 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755 ret_from_fork_asm+0x11/0x20 [ 95.890755] </TASK> [ 95.890755] [ 95.890755 Allocated by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755 __kasan_kmalloc+0x86/0x90 [ 95.890755] __kmalloc+0x17f/0x360 [ 95.890755 sk_prot_alloc+0xe1/0x1a0 [ 95.890755] sk_alloc+0x31/0x4e0 [ 95.890755 bt_sock_alloc+0x2b/0x2a0 [ 95.890755] sco_sock_create+0xad/0x320 [ 95.890755] bt_sock_create+0x145/0x320 [ 95.890755 __sock_create+0x2e1/0x650 [ 95.890755] __sys_socket+0xd0/0x280 [ 95.890755 __x64_sys_socket+0x75/0x80 [ 95.890755] do_syscall_64+0xc4/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] Freed by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755] kasan_save_free_info+0x40/0x50 [ 95.890755 poison_slab_object+0x118/0x180 [ 95.890755] __kasan_slab_free+0x12/0x30 [ 95.890755] kfree+0xb2/0x240 [ 95.890755] __sk_destruct+0x317/0x410 [ 95.890755] sco_sock_release+0x232/0x280 [ 95.890755] sock_close+0xb2/0x210 [ 95.890755] __fput+0x37f/0x770 [ 95.890755] task_work_run+0x1ae/0x210 [ 95.890755] get_signal+0xe17/0xf70 [ 95.890755 arch_do_signal_or_restart+0x3f/0x520 [ 95.890755 syscall_exit_to_user_mode+0x55/0x120 [ 95.890755] do_syscall_64+0xd1/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] The buggy address belongs to the object at ffff88800c388000 [ 95.890755] which belongs to the cache kmalloc-1k of size 1024 [ 95.890755 The buggy address is located 128 bytes inside of [ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400) [ 95.890755] [ 95.890755] The buggy address belongs to the physical page: [ 95.890755 page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388 [ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 95.890755] ano ---truncated---)(CVE-2024-27398) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 107 Livepatch subscription required
High
CVE-2024-38630
CVE-2024-27398
CVE-2024-26923
CVE-2024-26960
CVE-2024-26921
LSN-0108-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request goes to the backlog and crypto_aead_decrypt returns -EBUSY, tls_do_decryption will wait until all async decryptions have completed. If one of them fails, tls_do_decryption will return -EBADMSG and tls_decrypt_sg jumps to the error path, releasing all the pages. But the pages have been passed to the async callback, and have already been released by tls_decrypt_done. The only true async case is when crypto_aead_decrypt returns -EINPROGRESS. With -EBUSY, we already waited so we can tell tls_sw_recvmsg that the data is available for immediate copy, but we need to notify tls_decrypt_sg (via the new ->async_done flag) that the memory has already been released.)(CVE-2024-26800) In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previously a theoretical window where swapoff() could run and teardown a swap_info_struct while a call to free_swap_and_cache() was running in another thread. This could cause, amongst other bad possibilities, swap_page_trans_huge_swapped() (called by free_swap_and_cache()) to access the freed memory for swap_map. This is a theoretical problem and I haven't been able to provoke it from a test case. But there has been agreement based on code review that this is possible (see link below). Fix it by using get_swap_device()/put_swap_device(), which will stall swapoff(). There was an extra check in _swap_info_get() to confirm that the swap entry was not free. This isn't present in get_swap_device() because it doesn't make sense in general due to the race between getting the reference and swapoff. So I've added an equivalent check directly in free_swap_and_cache(). Details of how to provoke one possible issue (thanks to David Hildenbrand for deriving this): --8<----- __swap_entry_free() might be the last user and result in 'count == SWAP_HAS_CACHE'. swapoff->try_to_unuse() will stop as soon as soon as si->inuse_pages==0. So the question is: could someone reclaim the folio and turn si->inuse_pages==0, before we completed swap_page_trans_huge_swapped(). Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are still references by swap entries. Process 1 still references subpage 0 via swap entry. Process 2 still references subpage 1 via swap entry. Process 1 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE [then, preempted in the hypervisor etc.] Process 2 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls __try_to_reclaim_swap(). __try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()-> put_swap_folio()->free_swap_slot()->swapcache_free_entries()-> swap_entry_free()->swap_range_free()-> ... WRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries); What stops swapoff to succeed after process 2 reclaimed the swap cache but before process1 finished its call to swap_page_trans_huge_swapped()? --8<-----)(CVE-2024-26960) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge whether the sco disconnection is timeout. The sock will be deallocated later, but it is dereferenced again in sco_sock_timeout. As a result, the use-after-free bugs will happen. The root cause is shown below: Cleanup Thread Worker Thread sco_sock_release sco_sock_close __sco_sock_close sco_sock_set_timer schedule_delayed_work sco_sock_kill (wait a time) sock_put(sk) //FREE sco_sock_timeout sock_hold(sk) //USE The KASAN report triggered by POC is shown below: [ 95.890016 ================================================================== [ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0 [ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7 ... [ 95.890755] Workqueue: events sco_sock_timeout [ 95.890755] Call Trace: [ 95.890755] <TASK> [ 95.890755] dump_stack_lvl+0x45/0x110 [ 95.890755] print_address_description+0x78/0x390 [ 95.890755 print_report+0x11b/0x250 [ 95.890755] ? __virt_addr_valid+0xbe/0xf0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_report+0x139/0x170 [ 95.890755] ? update_load_avg+0xe5/0x9f0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_check_range+0x2c3/0x2e0 [ 95.890755] sco_sock_timeout+0x5e/0x1c0 [ 95.890755] process_one_work+0x561/0xc50 [ 95.890755 worker_thread+0xab2/0x13c0 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] kthread+0x279/0x300 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755] ret_from_fork+0x34/0x60 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755 ret_from_fork_asm+0x11/0x20 [ 95.890755] </TASK> [ 95.890755] [ 95.890755 Allocated by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755 __kasan_kmalloc+0x86/0x90 [ 95.890755] __kmalloc+0x17f/0x360 [ 95.890755 sk_prot_alloc+0xe1/0x1a0 [ 95.890755] sk_alloc+0x31/0x4e0 [ 95.890755 bt_sock_alloc+0x2b/0x2a0 [ 95.890755] sco_sock_create+0xad/0x320 [ 95.890755] bt_sock_create+0x145/0x320 [ 95.890755 __sock_create+0x2e1/0x650 [ 95.890755] __sys_socket+0xd0/0x280 [ 95.890755 __x64_sys_socket+0x75/0x80 [ 95.890755] do_syscall_64+0xc4/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] Freed by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755] kasan_save_free_info+0x40/0x50 [ 95.890755 poison_slab_object+0x118/0x180 [ 95.890755] __kasan_slab_free+0x12/0x30 [ 95.890755] kfree+0xb2/0x240 [ 95.890755] __sk_destruct+0x317/0x410 [ 95.890755] sco_sock_release+0x232/0x280 [ 95.890755] sock_close+0xb2/0x210 [ 95.890755] __fput+0x37f/0x770 [ 95.890755] task_work_run+0x1ae/0x210 [ 95.890755] get_signal+0xe17/0xf70 [ 95.890755 arch_do_signal_or_restart+0x3f/0x520 [ 95.890755 syscall_exit_to_user_mode+0x55/0x120 [ 95.890755] do_syscall_64+0xd1/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] The buggy address belongs to the object at ffff88800c388000 [ 95.890755] which belongs to the cache kmalloc-1k of size 1024 [ 95.890755 The buggy address is located 128 bytes inside of [ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400) [ 95.890755] [ 95.890755] The buggy address belongs to the physical page: [ 95.890755 page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388 [ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 95.890755] ano ---truncated---)(CVE-2024-27398) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions check, meaning the execution may gain unintended privileges. For example, if a file could change permissions from executable and not set-id: ---------x 1 root root 16048 Aug 7 13:16 target to set-id and non- executable: ---S------ 1 root root 16048 Aug 7 13:16 target it is possible to gain root privileges when execution should have been disallowed. While this race condition is rare in real-world scenarios, it has been observed (and proven exploitable) when package managers are updating the setuid bits of installed programs. Such files start with being world-executable but then are adjusted to be group-exec with a set-uid bit. For example, 'chmod o-x,u+s target' makes 'target' executable only by uid 'root' and gid 'cdrom', while also becoming setuid-root: -rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target becomes: -rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target But racing the chmod means users without group 'cdrom' membership can get the permission to execute 'target' just before the chmod, and when the chmod finishes, the exec reaches brpm_fill_uid(), and performs the setuid to root, violating the expressed authorization of 'only cdrom group members can setuid to root'. Re-check that we still have execute permissions in case the metadata has changed. It would be better to keep a copy from the perm-check time, but until we can do that refactoring, the least-bad option is to do a full inode_permission() call (under inode lock). It is understood that this is safe against dead-locks, but hardly optimal.)(CVE-2024-43882) In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-50264) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 108 Livepatch subscription required
High
CVE-2024-26960
CVE-2024-26800
CVE-2024-27398
CVE-2024-50264
CVE-2024-26921
CVE-2024-43882
CVE-2024-38630
LSN-0109-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request goes to the backlog and crypto_aead_decrypt returns -EBUSY, tls_do_decryption will wait until all async decryptions have completed. If one of them fails, tls_do_decryption will return -EBADMSG and tls_decrypt_sg jumps to the error path, releasing all the pages. But the pages have been passed to the async callback, and have already been released by tls_decrypt_done. The only true async case is when crypto_aead_decrypt returns -EINPROGRESS. With -EBUSY, we already waited so we can tell tls_sw_recvmsg that the data is available for immediate copy, but we need to notify tls_decrypt_sg (via the new ->async_done flag) that the memory has already been released.)(CVE-2024-26800) In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions check, meaning the execution may gain unintended privileges. For example, if a file could change permissions from executable and not set-id: ---------x 1 root root 16048 Aug 7 13:16 target to set-id and non- executable: ---S------ 1 root root 16048 Aug 7 13:16 target it is possible to gain root privileges when execution should have been disallowed. While this race condition is rare in real-world scenarios, it has been observed (and proven exploitable) when package managers are updating the setuid bits of installed programs. Such files start with being world-executable but then are adjusted to be group-exec with a set-uid bit. For example, 'chmod o-x,u+s target' makes 'target' executable only by uid 'root' and gid 'cdrom', while also becoming setuid-root: -rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target becomes: -rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target But racing the chmod means users without group 'cdrom' membership can get the permission to execute 'target' just before the chmod, and when the chmod finishes, the exec reaches brpm_fill_uid(), and performs the setuid to root, violating the expressed authorization of 'only cdrom group members can setuid to root'. Re-check that we still have execute permissions in case the metadata has changed. It would be better to keep a copy from the perm-check time, but until we can do that refactoring, the least-bad option is to do a full inode_permission() call (under inode lock). It is understood that this is safe against dead-locks, but hardly optimal.)(CVE-2024-43882) In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-50264) In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to NULL, which could lead to a dangling pointer. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-53103) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 109 Livepatch subscription required
High
CVE-2024-26921
CVE-2024-38630
CVE-2024-43882
CVE-2024-50264
CVE-2024-26800
CVE-2024-53103
LSN-0110-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc Any unprivileged user can attach N_GSM0710 ldisc, but it requires CAP_NET_ADMIN to create a GSM network anyway. Require initial namespace CAP_NET_ADMIN to do that.)(CVE-2023-52880) In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc. Then the packet itself gets parsed to populate the rest of the keys from the packet headers. Whenever the packet parsing code starts parsing the ICMPv6 header, it first zeroes out fields in the key corresponding to Neighbor Discovery information even if it is not an ND packet. It is an 'ipv6.nd' field. However, the 'ipv6' is a union that shares the space between 'nd' and 'ct_orig' that holds the original tuple conntrack metadata parsed from the OVS_PACKET_ATTR_KEY. ND packets should not normally have conntrack state, so it's fine to share the space, but normal ICMPv6 Echo packets or maybe other types of ICMPv6 can have the state attached and it should not be overwritten. The issue results in all but the last 4 bytes of the destination address being wiped from the original conntrack tuple leading to incorrect packet matching and potentially executing wrong actions in case this packet recirculates within the datapath or goes back to userspace. ND fields should not be accessed in non-ND packets, so not clearing them should be fine. Executing memset() only for actual ND packets to avoid the issue. Initializing the whole thing before parsing is needed because ND packet may not contain all the options. The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't affect packets entering OVS datapath from network interfaces, because in this case CT metadata is populated from skb after the packet is already parsed.)(CVE-2024-38558) In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.)(CVE-2024-53104) In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative dumping of data. It provides the families the following ops: - start - (optional) kicks off the dumping process - dump - actual dump helper, keeps getting called until it returns 0 - done - (optional) pairs with .start, can be used for cleanup The whole process is asynchronous and the repeated calls to .dump don't actually happen in a tight loop, but rather are triggered in response to recvmsg() on the socket. This gives the user full control over the dump, but also means that the user can close the socket without getting to the end of the dump. To make sure .start is always paired with .done we check if there is an ongoing dump before freeing the socket, and if so call .done. The complication is that sockets can get freed from BH and .done is allowed to sleep. So we use a workqueue to defer the call, when needed. Unfortunately this does not work correctly. What we defer is not the cleanup but rather releasing a reference on the socket. We have no guarantee that we own the last reference, if someone else holds the socket they may release it in BH and we're back to square one. The whole dance, however, appears to be unnecessary. Only the user can interact with dumps, so we can clean up when socket is closed. And close always happens in process context. Some async code may still access the socket after close, queue notification skbs to it etc. but no dumps can start, end or otherwise make progress. Delete the workqueue and flush the dump state directly from the release handler. Note that further cleanup is possible in -next, for instance we now always call .done before releasing the main module reference, so dump doesn't have to take a reference of its own.)(CVE-2024-53140) In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code.)(CVE-2025-0927) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 110 Livepatch subscription required
High
CVE-2024-53140
CVE-2023-52880
CVE-2024-53104
CVE-2024-56672
CVE-2025-0927
CVE-2024-38558
LSN-0111-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
It was discovered that the watch_queue event notification system contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or escalate their privileges.)(CVE-2022-0995) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-26928) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-35864) In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero- initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.)(CVE-2024-50302) In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it. On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks. This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity. So, add explicit guards to prevent potential risk of OOM issues.)(CVE-2024-53063) In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.)(CVE-2024-56595) In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672) In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.)(CVE-2024-57798) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 111 Livepatch subscription required
High
CVE-2024-50302
CVE-2024-26928
CVE-2024-53063
CVE-2024-35864
CVE-2024-56595
CVE-2024-57798
CVE-2024-56672
CVE-2022-0995
LSN-0112-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix use-after-free due to delegation race A delegation break could arrive as soon as we've called vfs_setlease. A delegation break runs a callback which immediately (in nfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we then exit nfs4_set_delegation without hashing the delegation, it will be freed as soon as the callback is done with it, without ever being removed from del_recall_lru. Symptoms show up later as use-after-free or list corruption warnings, usually in the laundromat thread. I suspect aba2072f4523 'nfsd: grant read delegations to clients holding writes' made this bug easier to hit, but I looked as far back as v3.0 and it looks to me it already had the same problem. So I'm not sure where the bug was introduced; it may have been there from the beginning.)(CVE-2021-47506) Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or escalate their privileges.)(CVE-2022-0995) In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic leak in ring data allocation/free, where aq_ring_free could be called multiple times on same ring, if system is under stress and got memory allocation error. Ring pointer was used as an indicator of failure, but this is not correct since only ring data is allocated/deallocated. Ring itself is an array member. Changing ring allocation functions to return error code directly. This simplifies error handling and eliminates aq_ring_free on higher layer.)(CVE-2023-52664) In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), 'use after free' error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This implies before the refcount could be increment here, it was freed. In same file, in 'handle_cap_grant()' refcount is decremented by this line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race occurred and resource was freed by the latter line before the former line could increment it. encode_cap_msg() is called by __send_cap() and __send_cap() is called by ceph_check_caps() after calling __prep_cap(). __prep_cap() is where arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where the refcount must be increased to prevent 'use after free' error.)(CVE-2024-26689) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-35864) In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero- initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.)(CVE-2024-50302) In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it. On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks. This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity. So, add explicit guards to prevent potential risk of OOM issues.)(CVE-2024-53063) In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.)(CVE-2024-53150) In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 (CVE-2024-53168) In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.)(CVE-2024-53197) In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 (CVE-2024-56551) In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue. The problem is the number of entries in the pre-allocated sgtable, it is nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) >> 4 + 1. Given the default [rt]xglom_size=32 it's actually 35 which is too small. Worst case, the pkt queue can end up with 64 SKBs. This occurs when a new SKB is added for each original SKB if tailroom isn't enough to hold tail_pad. At least one sg entry is needed for each SKB. So, eventually the 'skb_queue_walk loop' in brcmf_sdiod_sglist_rw may run out of sg entries. This makes sg_next return NULL and this causes the oops. The patch sets nents to max(rxglom_size, txglom_size) * 2 to be able handle the worst- case. Btw. this requires only 64-35=29 * 16 (or 20 if CONFIG_NEED_SG_DMA_LENGTH) = 464 additional bytes of memory.)(CVE-2024-56593) In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.)(CVE-2024-56595) In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.)(CVE-2024-56598) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump hci_devcd_append may lead to the release of the skb, so it cannot be accessed once it is called. (CVE-2024-56653) In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.)(CVE-2024-57798) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_oracle_(\d+) - 112 Livepatch subscription required
High
CVE-2022-0995
CVE-2024-53168
CVE-2024-56551
CVE-2024-56598
CVE-2024-35864
CVE-2024-56653
CVE-2024-53063
CVE-2021-47506
CVE-2024-53150
CVE-2024-53197
CVE-2024-56593
CVE-2024-50302
CVE-2024-57798
CVE-2024-56595
CVE-2023-52664
CVE-2024-26689
/etc/lsb-release
^[\s\S]*DISTRIB_CODENAME=([a-z]+)$
1
oval:com.ubuntu.noble:var:681610000000
oval:com.ubuntu.noble:var:681610000020
oval:com.ubuntu.noble:var:681610000040
oval:com.ubuntu.noble:var:681610000060
oval:com.ubuntu.noble:var:681610000080
oval:com.ubuntu.noble:var:681710000000
oval:com.ubuntu.noble:var:681710000020
oval:com.ubuntu.noble:var:681720000000
oval:com.ubuntu.noble:var:681730000000
oval:com.ubuntu.noble:var:681730000020
oval:com.ubuntu.noble:var:686310000000
oval:com.ubuntu.noble:var:686310000020
oval:com.ubuntu.noble:var:686310000040
oval:com.ubuntu.noble:var:686310000060
oval:com.ubuntu.noble:var:686310000080
oval:com.ubuntu.noble:var:686410000000
oval:com.ubuntu.noble:var:686410000020
oval:com.ubuntu.noble:var:686420000000
oval:com.ubuntu.noble:var:686420000020
oval:com.ubuntu.noble:var:686430000000
oval:com.ubuntu.noble:var:687510000000
oval:com.ubuntu.noble:var:687810000000
oval:com.ubuntu.noble:var:689310000000
oval:com.ubuntu.noble:var:689310000020
oval:com.ubuntu.noble:var:689310000040
oval:com.ubuntu.noble:var:689310000060
oval:com.ubuntu.noble:var:689310000080
oval:com.ubuntu.noble:var:689310000100
oval:com.ubuntu.noble:var:689310000120
oval:com.ubuntu.noble:var:689320000000
oval:com.ubuntu.noble:var:689320000020
oval:com.ubuntu.noble:var:689330000000
oval:com.ubuntu.noble:var:691810000000
oval:com.ubuntu.noble:var:692110000000
oval:com.ubuntu.noble:var:692110000020
oval:com.ubuntu.noble:var:692110000040
oval:com.ubuntu.noble:var:692110000060
oval:com.ubuntu.noble:var:692110000080
oval:com.ubuntu.noble:var:692110000100
oval:com.ubuntu.noble:var:692110000120
oval:com.ubuntu.noble:var:692120000000
oval:com.ubuntu.noble:var:694910000000
oval:com.ubuntu.noble:var:694910000020
oval:com.ubuntu.noble:var:694910000040
oval:com.ubuntu.noble:var:694910000060
oval:com.ubuntu.noble:var:694910000080
oval:com.ubuntu.noble:var:694910000100
oval:com.ubuntu.noble:var:694920000000
oval:com.ubuntu.noble:var:694920000020
oval:com.ubuntu.noble:var:695210000000
oval:com.ubuntu.noble:var:695210000020
oval:com.ubuntu.noble:var:695220000000
oval:com.ubuntu.noble:var:695510000000
oval:com.ubuntu.noble:var:697510000000
oval:com.ubuntu.noble:var:697510000020
oval:com.ubuntu.noble:var:697510000040
oval:com.ubuntu.noble:var:697510000060
oval:com.ubuntu.noble:var:697510000080
oval:com.ubuntu.noble:var:697510000100
oval:com.ubuntu.noble:var:697510000120
oval:com.ubuntu.noble:var:697510000140
oval:com.ubuntu.noble:var:697510000160
oval:com.ubuntu.noble:var:697510000180
oval:com.ubuntu.noble:var:699910000000
oval:com.ubuntu.noble:var:699910000020
oval:com.ubuntu.noble:var:699910000040
oval:com.ubuntu.noble:var:699910000060
oval:com.ubuntu.noble:var:699910000080
oval:com.ubuntu.noble:var:699910000100
oval:com.ubuntu.noble:var:699920000000
oval:com.ubuntu.noble:var:700410000000
oval:com.ubuntu.noble:var:700510000000
oval:com.ubuntu.noble:var:700510000020
oval:com.ubuntu.noble:var:702010000000
oval:com.ubuntu.noble:var:702010000020
oval:com.ubuntu.noble:var:702010000040
oval:com.ubuntu.noble:var:702010000060
oval:com.ubuntu.noble:var:702010000080
oval:com.ubuntu.noble:var:702010000100
oval:com.ubuntu.noble:var:702010000120
oval:com.ubuntu.noble:var:702010000140
oval:com.ubuntu.noble:var:702020000000
oval:com.ubuntu.noble:var:702030000000
oval:com.ubuntu.noble:var:707110000000
oval:com.ubuntu.noble:var:707110000020
oval:com.ubuntu.noble:var:707110000040
oval:com.ubuntu.noble:var:707110000060
oval:com.ubuntu.noble:var:707110000080
oval:com.ubuntu.noble:var:707110000100
oval:com.ubuntu.noble:var:707110000120
oval:com.ubuntu.noble:var:707110000140
oval:com.ubuntu.noble:var:707120000000
oval:com.ubuntu.noble:var:707410000000
oval:com.ubuntu.noble:var:708910000000
oval:com.ubuntu.noble:var:708920000000
oval:com.ubuntu.noble:var:708920000020
oval:com.ubuntu.noble:var:708920000040
oval:com.ubuntu.noble:var:708920000060
oval:com.ubuntu.noble:var:708920000080
oval:com.ubuntu.noble:var:708930000000
oval:com.ubuntu.noble:var:708930000020
oval:com.ubuntu.noble:var:708940000000
oval:com.ubuntu.noble:var:708950000000
oval:com.ubuntu.noble:var:708960000000
oval:com.ubuntu.noble:var:708970000000
oval:com.ubuntu.noble:var:709510000000
oval:com.ubuntu.noble:var:709510000020
oval:com.ubuntu.noble:var:712010000000
oval:com.ubuntu.noble:var:712010000020
oval:com.ubuntu.noble:var:712010000040
oval:com.ubuntu.noble:var:712010000060
oval:com.ubuntu.noble:var:712010000080
oval:com.ubuntu.noble:var:712010000100
oval:com.ubuntu.noble:var:712010000120
oval:com.ubuntu.noble:var:712010000140
oval:com.ubuntu.noble:var:712010000160
oval:com.ubuntu.noble:var:712020000000
oval:com.ubuntu.noble:var:712030000000
oval:com.ubuntu.noble:var:715410000000
oval:com.ubuntu.noble:var:715410000020
oval:com.ubuntu.noble:var:715410000040
oval:com.ubuntu.noble:var:715410000060
oval:com.ubuntu.noble:var:715410000080
oval:com.ubuntu.noble:var:715410000100
oval:com.ubuntu.noble:var:715410000120
oval:com.ubuntu.noble:var:715410000140
oval:com.ubuntu.noble:var:715410000160
oval:com.ubuntu.noble:var:715510000000
oval:com.ubuntu.noble:var:715510000020
oval:com.ubuntu.noble:var:715610000000
oval:com.ubuntu.noble:var:716710000000
oval:com.ubuntu.noble:var:716710000020
oval:com.ubuntu.noble:var:716710000040
oval:com.ubuntu.noble:var:716710000060
oval:com.ubuntu.noble:var:716710000080
oval:com.ubuntu.noble:var:716710000100
oval:com.ubuntu.noble:var:716710000120
oval:com.ubuntu.noble:var:716710000140
oval:com.ubuntu.noble:var:716710000160
oval:com.ubuntu.noble:var:716710000180
oval:com.ubuntu.noble:var:716720000000
oval:com.ubuntu.noble:var:717010000000
oval:com.ubuntu.noble:var:718710000000
oval:com.ubuntu.noble:var:719610000000
oval:com.ubuntu.noble:var:722110000000
oval:com.ubuntu.noble:var:723610000000
oval:com.ubuntu.noble:var:723610000020
oval:com.ubuntu.noble:var:723610000040
oval:com.ubuntu.noble:var:723610000060
oval:com.ubuntu.noble:var:723610000080
oval:com.ubuntu.noble:var:723610000100
oval:com.ubuntu.noble:var:723610000120
oval:com.ubuntu.noble:var:723610000140
oval:com.ubuntu.noble:var:723610000160
oval:com.ubuntu.noble:var:723610000180
oval:com.ubuntu.noble:var:723710000000
oval:com.ubuntu.noble:var:723810000000
oval:com.ubuntu.noble:var:730110000000
oval:com.ubuntu.noble:var:730110000020
oval:com.ubuntu.noble:var:730310000000
oval:com.ubuntu.noble:var:730310000020
oval:com.ubuntu.noble:var:730320000000
oval:com.ubuntu.noble:var:730330000000
oval:com.ubuntu.noble:var:730410000000
oval:com.ubuntu.noble:var:730410000020
oval:com.ubuntu.noble:var:730410000040
oval:com.ubuntu.noble:var:731010000000
oval:com.ubuntu.noble:var:731110000000
oval:com.ubuntu.noble:var:732210000000
oval:com.ubuntu.noble:var:732310000000
oval:com.ubuntu.noble:var:732410000000
oval:com.ubuntu.noble:var:732410000020
oval:com.ubuntu.noble:var:732510000000
oval:com.ubuntu.noble:var:732510000020
oval:com.ubuntu.noble:var:732510000040
oval:com.ubuntu.noble:var:732520000000
oval:com.ubuntu.noble:var:732530000000
oval:com.ubuntu.noble:var:732610000000
oval:com.ubuntu.noble:var:732610000020
oval:com.ubuntu.noble:var:732610000040
oval:com.ubuntu.noble:var:737910000000
oval:com.ubuntu.noble:var:737910000020
oval:com.ubuntu.noble:var:738110000000
oval:com.ubuntu.noble:var:738210000000
oval:com.ubuntu.noble:var:738310000000
oval:com.ubuntu.noble:var:738310000020
oval:com.ubuntu.noble:var:738310000040
oval:com.ubuntu.noble:var:738310000060
oval:com.ubuntu.noble:var:738310000080
oval:com.ubuntu.noble:var:738310000100
oval:com.ubuntu.noble:var:738310000120
oval:com.ubuntu.noble:var:738310000140
oval:com.ubuntu.noble:var:738310000160
oval:com.ubuntu.noble:var:738310000180
oval:com.ubuntu.noble:var:738320000000
oval:com.ubuntu.noble:var:738410000000
oval:com.ubuntu.noble:var:738510000000
oval:com.ubuntu.noble:var:738610000000
oval:com.ubuntu.noble:var:740210000000
oval:com.ubuntu.noble:var:740210000020
oval:com.ubuntu.noble:var:740210000040
oval:com.ubuntu.noble:var:740210000060
oval:com.ubuntu.noble:var:740210000080
oval:com.ubuntu.noble:var:740210000100
oval:com.ubuntu.noble:var:740210000120
oval:com.ubuntu.noble:var:740210000140
oval:com.ubuntu.noble:var:740210000160
oval:com.ubuntu.noble:var:740220000000
oval:com.ubuntu.noble:var:740230000000
oval:com.ubuntu.noble:var:740240000000
oval:com.ubuntu.noble:var:740240000020
oval:com.ubuntu.noble:var:744510000000
oval:com.ubuntu.noble:var:744510000020
oval:com.ubuntu.noble:var:744510000040
oval:com.ubuntu.noble:var:744810000000
oval:com.ubuntu.noble:var:744910000000
oval:com.ubuntu.noble:var:744910000020
oval:com.ubuntu.noble:var:744910000040
oval:com.ubuntu.noble:var:744910000060
oval:com.ubuntu.noble:var:744910000080
oval:com.ubuntu.noble:var:744910000100
oval:com.ubuntu.noble:var:744910000120
oval:com.ubuntu.noble:var:744910000140
oval:com.ubuntu.noble:var:744910000160
oval:com.ubuntu.noble:var:744910000180
oval:com.ubuntu.noble:var:745010000000
oval:com.ubuntu.noble:var:745010000020
oval:com.ubuntu.noble:var:745010000040
oval:com.ubuntu.noble:var:745310000000
oval:com.ubuntu.noble:var:746810000000
oval:com.ubuntu.noble:var:748910000000
oval:com.ubuntu.noble:var:748910000020
oval:com.ubuntu.noble:var:748910000040
oval:com.ubuntu.noble:var:749110000000
oval:com.ubuntu.noble:var:749210000000
oval:com.ubuntu.noble:var:749210000020
oval:com.ubuntu.noble:var:749210000040
oval:com.ubuntu.noble:var:749210000060
oval:com.ubuntu.noble:var:749210000080
oval:com.ubuntu.noble:var:749210000100
oval:com.ubuntu.noble:var:749210000120
oval:com.ubuntu.noble:var:749210000140
oval:com.ubuntu.noble:var:749210000160
oval:com.ubuntu.noble:var:749210000180
oval:com.ubuntu.noble:var:749210000200
oval:com.ubuntu.noble:var:749220000000
oval:com.ubuntu.noble:var:749310000000
oval:com.ubuntu.noble:var:749910000000
oval:com.ubuntu.noble:var:750010000000
oval:com.ubuntu.noble:var:751310000000
oval:com.ubuntu.noble:var:751310000020
oval:com.ubuntu.noble:var:751310000040
oval:com.ubuntu.noble:var:751310000060
oval:com.ubuntu.noble:var:751310000080
oval:com.ubuntu.noble:var:751320000000
oval:com.ubuntu.noble:var:751330000000
oval:com.ubuntu.noble:var:751330000020
oval:com.ubuntu.noble:var:751410000000
oval:com.ubuntu.noble:var:751410000020
oval:com.ubuntu.noble:var:751510000000
oval:com.ubuntu.noble:var:751520000000
oval:com.ubuntu.noble:var:751520000020
oval:com.ubuntu.noble:var:752110000000
oval:com.ubuntu.noble:var:752110000020
oval:com.ubuntu.noble:var:752110000040
oval:com.ubuntu.noble:var:752130000000
oval:com.ubuntu.noble:var:752210000000
oval:com.ubuntu.noble:var:752310000000
oval:com.ubuntu.noble:var:752410000000
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
unix
noble
0:3.0.13-0ubuntu3.1
0:41.0.7-4ubuntu0.1
0:2.3.12-1ubuntu0.24.04.1
0:8.5.0-2ubuntu10.1
0:2.4.58-1ubuntu8.1
0:3.8.3-1.1ubuntu3.1
0:10.0.0-2ubuntu8.1
0:2.0.13-4ubuntu0.1
0:2.39-0ubuntu8.1
0:10.2.0-1ubuntu1
0:20240213.00-0ubuntu3.1
0:20240320.00-0ubuntu1~24.04.1
0:1.59.0-1ubuntu0.1
0:590-2ubuntu2.1
0:3.5.1+dfsg1-0ubuntu1
0:2.0.12-1ubuntu1
0:10.0.0-2ubuntu8.2
0:2.80.0-6ubuntu3.1
1:2.23-1ubuntu0.1
0:0.4.4-1ubuntu0.1
0:8.0.105-0ubuntu1~24.04.1
0:8.0.105-8.0.5-0ubuntu1~24.04.1
0:8.0.5-0ubuntu1~24.04.1
0:3.6-2ubuntu0.1
0:1.7.17-1ubuntu0.1~esm2
0:46.2-1~ubuntu24.04.2
0:3.1.2-1ubuntu1.1
0:2.44.2-0ubuntu0.24.04.1
4:0.9+LibO24.2.3-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2
4:102.12+LibO24.2.3-0ubuntu0.24.04.2
4:24.2.3-0ubuntu0.24.04.2
1:2.13.0-3ubuntu2
0:1.19.2-1ubuntu3.1
1:2.43.0-1ubuntu7.1
0:8.4.4-1.1ubuntu6.1
0:4.0.1-7.1ubuntu5.1
0:3.20240514.0ubuntu0.24.04.1
0:1.24.2-1ubuntu0.1
0:3.0.1-3ubuntu0.1
0:1.0.2-2ubuntu1.1
0:16.3-0ubuntu0.24.04.1
7:6.1.1-3ubuntu5+esm1
0:2.39-0ubuntu8.2
0:3.7.2-2ubuntu0.1
0:2.42.10+dfsg-3ubuntu3.1
0:8u412-ga-1~24.04.2
0:1.14.0-1ubuntu2.1
0:3.8.2-2ubuntu0.1
6.8.0-\d+(-raspi)
0:6.8.0-1005
6.8.0-\d+(-ibm)
0:6.8.0-1006
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-35
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-35
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-35
6.8.0-\d+(-gcp)
0:6.8.0-1008
6.8.0-\d+(-aws)
0:6.8.0-1009
6.8.0-\d+(-oem)
0:6.8.0-1006
6.8.0-\d+(-gke)
0:6.8.0-1004
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1008
0:8.0.37-0ubuntu0.24.04.1
0:4.5.1+git230720-4ubuntu2.1
0:1.8-1fakesync1ubuntu0.24.04.1
0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm1
0:0.76.0-1ubuntu0.1
0:10.02.1~dfsg1-0ubuntu7.1
0:2.9.4-1.1ubuntu6.1
0:2.2.7-1ubuntu0.1
0:3.2.3-1ubuntu0.24.04.1
1:10.11.8-0ubuntu0.24.04.1
0:8.3.6-0ubuntu0.24.04.1
4:5.27.11-0ubuntu4.1
0:2.4.7-1.2ubuntu7.1
0:2.4.7-1.2ubuntu7.2
0:1.0-2ubuntu1.1
0:1.0-2ubuntu1.2
0:1.21.4-1ubuntu4.1
0:2.1.0-4.1ubuntu1.2
1:9.6p1-3ubuntu13.3
0:2.6.9-1ubuntu4.1
6.8.0-\d+(-raspi)
0:6.8.0-1006
6.8.0-\d+(-ibm)
0:6.8.0-1007
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1008
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-36
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-36
6.8.0-\d+(-intel)
0:6.8.0-1006
6.8.0-\d+(-gcp)
0:6.8.0-1009
6.8.0-\d+(-oem)
0:6.8.0-1007
6.8.0-\d+(-aws)
0:6.8.0-1010
6.8.0-\d+(-gke)
0:6.8.0-1005
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1009
4:0.9+LibO24.2.4-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2
4:102.12+LibO24.2.4-0ubuntu0.24.04.2
4:24.2.4-0ubuntu0.24.04.2
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1006
0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm2
2:24.0.0-0ubuntu1.2
2:24.0.0-0ubuntu1.3
2:28.0.1-0ubuntu1.2
3:29.0.1-0ubuntu1.3
0:2.4.58-1ubuntu8.2
0:2.4.58-1ubuntu8.3
0:2.4.58-1ubuntu8.6
0:1.21.9-1ubuntu0.1
0:1.22.2-2ubuntu0.1
1:9.6p1-3ubuntu13.4
3:4.2.11-1ubuntu1.1
0:8.0.107-0ubuntu1~24.04.1
0:8.0.107-8.0.7-0ubuntu1~24.04.1
0:8.0.7-0ubuntu1~24.04.1
6.8.0-\d+(-intel)
0:6.8.0-1007
6.8.0-\d+(-raspi)
0:6.8.0-1007
6.8.0-\d+(-ibm|-oem)
0:6.8.0-1008
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1010
6.8.0-\d+(-gcp)
0:6.8.0-1010
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-38
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-38
6.8.0-\d+(-gke)
0:6.8.0-1006
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1009
6.8.0-\d+(-aws)
0:6.8.0-1011
0:10.02.1~dfsg1-0ubuntu7.3
0:2.24.33-4ubuntu1.1
0:3.24.41-4ubuntu1.1
0:2.4.58-1ubuntu8.4
0:3.11.0-1ubuntu0.24.04.1
0:1.0.0-6ubuntu0.1
0:6.6-1ubuntu5.1
1:9.18.28-0ubuntu0.24.04.1
3:29.0.1-0ubuntu1.4
0:0.1.2+24.04
0:24.02.0-1ubuntu9.1
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1008
6.8.0-\d+(-gke)
0:6.8.0-1007
6.8.0-\d+(-raspi)
0:6.8.0-1008
6.8.0-\d+(-ibm|-oem)
0:6.8.0-1009
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1010
6.8.0-\d+(-gcp)
0:6.8.0-1011
6.8.0-\d+(-aws)
0:6.8.0-1012
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-39
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-39
0:8u422-b05-1~24.04
0:11.0.24+8-1ubuntu3~24.04.1
0:17.0.12+7-1ubuntu2~24.04
0:21.0.4+7-1ubuntu2~24.04
0:8.0.39-0ubuntu0.24.04.1
0:3.0.13-0ubuntu3.2
0:4.97-4ubuntu4.1
0:2.63+24.04ubuntu0.1
0:3.12.3-1ubuntu0.1
0:1.0.2-4ubuntu0.24.04.1
0:8.5.0-2ubuntu10.2
2:2.10-21ubuntu0.1
3:4.2.11-1ubuntu1.2
0:1.20.1-6ubuntu2.1
6.8.0-\d+(-gke)
0:6.8.0-1008
6.8.0-\d+(-ibm)
0:6.8.0-1010
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1011
6.8.0-\d+(-gcp)
0:6.8.0-1012
6.8.0-\d+(-aws)
0:6.8.0-1013
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-40
6.8.0-\d+(-raspi)
0:6.8.0-1009
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-40
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1010
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1011
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1012
6.8.0-\d+(-oem)
0:6.8.0-1010
0:8.0.108-0ubuntu1~24.04.1
0:8.0.108-8.0.8-0ubuntu1~24.04.1
0:8.0.8-0ubuntu1~24.04.1
1:1.36.1-6ubuntu3.1
4:0.9+LibO24.2.5-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2
4:102.12+LibO24.2.5-0ubuntu0.24.04.2
4:24.2.5-0ubuntu0.24.04.2
0:46.0-0ubuntu6~24.04.3
1:0.4.38-1ubuntu0.1
0:3.20240813.0ubuntu0.24.04.2
0:16.4-0ubuntu0.24.04.1
0:1.2.26+ds1-1ubuntu0.1
6.8.0-\d+(-gke)
0:6.8.0-1009
6.8.0-\d+(-raspi)
0:6.8.0-1010
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1011
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1012
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1012
6.8.0-\d+(-gcp)
0:6.8.0-1013
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1013
6.8.0-\d+(-aws)
0:6.8.0-1014
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-41
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-41
1:8.2.2+ds-0ubuntu1.2
1:2.3.21+dfsg1-2ubuntu6
7:6.1.1-3ubuntu5+esm2
1:1.8.7-1ubuntu0.1.24.04.1
0:3.0.13-0ubuntu3.4
3:4.2.11-1ubuntu1.3
0:24.3.0-1ubuntu0.1
1:24.1.1-0ubuntu1.2
0:0.20180824+1.9.0-2ubuntu0.1~esm2
0:1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2
0:1.9.0-2ubuntu0.1~esm2
0:3.9.1-1ubuntu0.1
2:9.1.0016-1ubuntu7.2
0:2.44.3-0ubuntu0.24.04.1
0:4.5.1+git230720-4ubuntu2.2
0:1.19.2-1ubuntu3.2
6.8.0-\d+(-gke)
0:6.8.0-1010
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1012
6.8.0-\d+(-gcp)
0:6.8.0-1014
6.8.0-\d+(-aws)
0:6.8.0-1015
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-44
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-44
6.8.0-\d+(-raspi)
0:6.8.0-1011
0:2.6.1-2ubuntu0.1
0:1.2-4.1ubuntu2.24.0.4.1+esm1
0:68.1.2-2ubuntu1.1
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1014
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1013
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1013
0:3.6.7-9.1ubuntu0.1~esm1
0:1.0.7+dfsg-0ubuntu0.24.04.1
0:8.5.0-2ubuntu10.4
0:1.24.0-2ubuntu7.1
0:3.12.3-1ubuntu0.2
0:8.4.4-1.1ubuntu6.2
6.8.0-\d+(-gke)
0:6.8.0-1011
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1013
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1014
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1014
6.8.0-\d+(-gcp)
0:6.8.0-1015
6.8.0-\d+(-aws)
0:6.8.0-1016
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-45
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-45
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1015
6.8.0-\d+(-raspi)
0:6.8.0-1012
1:29.3+1-1ubuntu2+esm1
0:6.4.2-4ubuntu4.3
0:9.0.70-2ubuntu0.1
0:3.20240910.0ubuntu0.24.04.1
0:2.5.0-2ubuntu0.1
0:1.7.2-3.1ubuntu0.1
0:2.4.7-1.2ubuntu7.3
0:2.0.0-0ubuntu10.1
0:2.0.0-0ubuntu10.2
0:2.0.0-0ubuntu7.1
2:2.0.0-0ubuntu4.1
0:0.9.0-1ubuntu0.1
0:1.14.6-1ubuntu0.1
2:9.1.0016-1ubuntu7.3
0:8.3.6-0ubuntu0.24.04.2
0:2.10.1-2ubuntu0.1
0:6.0-28ubuntu4.1
0:3.2.5+dfsg-3~ubuntu24.04.1
0:1.8.1-1ubuntu0.1
0:8.0.10-0ubuntu1~24.04.1
0:8.0.110-0ubuntu1~24.04.1
0:8.0.110-8.0.10-0ubuntu1~24.04.1
0:2.6.11-2.1ubuntu0.1
0:1.14.51-2ubuntu0.1
0:1.11ubuntu0.1
0:7.2-2ubuntu0.1
0:3.7.2-2ubuntu0.2
6.8.0-\d+(-raspi)
0:6.8.0-1013
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1014
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1015
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1015
6.8.0-\d+(-gcp)
0:6.8.0-1016
6.8.0-\d+(-aws)
0:6.8.0-1017
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-47
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-47
6.8.0-\d+(-gke)
0:6.8.0-1012
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1016
0:3.20231019.1ubuntu2.1
0:2.46.1-0ubuntu0.24.04.1
0:1.19.2-1ubuntu3.3
0:1.22.2-2ubuntu0.3
0:1.17.6-1ubuntu4.1
0:2.5.0-2ubuntu0.2
0:2.0.7-1ubuntu0.1
0:24.0+dfsg-1ubuntu1.1
2:21.1.12-1ubuntu1.1
2:23.2.6-1ubuntu0.1
0:3.7.2-2ubuntu0.3
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-48
6.8.0-\d+(-ibm)
0:6.8.0-1014
6.8.0-\d+(-ibm)
0:6.8.0-1015
6.8.0-\d+(-azure|-azure-fde|-gcp)
0:6.8.0-1016
6.8.0-\d+(-gcp)
0:6.8.0-1017
6.8.0-\d+(-azure)
0:6.8.0-1017
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1015
6.8.0-\d+(-aws)
0:6.8.0-1018
6.8.0-\d+(-oem)
0:6.8.0-1016
6.8.0-\d+(-raspi)
0:6.8.0-1014
6.8.0-\d+(-gke)
0:6.8.0-1013
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-48
0:3.2.3-1ubuntu0.24.04.3
0:1.32.5-1ubuntu1.1
0:3.0.1-3ubuntu0.2
1:8.2.2+ds-0ubuntu1.4
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1017
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1017
0:8u432-ga~us1-0ubuntu2~24.04
0:8u442-b06~us1-0ubuntu1~24.04
0:11.0.25+9-1ubuntu1~24.04
0:17.0.13+11-2ubuntu1~24.04
0:21.0.5+11-1ubuntu1~24.04
0:8.0.40-0ubuntu0.24.04.1
0:10.02.1~dfsg1-0ubuntu7.4
0:8.5.0-2ubuntu10.5
0:2.10.1-2ubuntu0.1+esm1
0:2.46.3-0ubuntu0.24.04.1
0:2.80.0-6ubuntu3.2
0:2.1.2-2ubuntu0.1~esm1
0:3.12.3-1ubuntu0.3
0:1.35-1ubuntu0.24.04.1
0:3.6-7ubuntu4.3
0:3.6-7ubuntu4.4
0:3.6-7ubuntu4.5
6.8.0-\d+(-gke)
0:6.8.0-1014
6.8.0-\d+(-raspi)
0:6.8.0-1015
6.8.0-\d+(-ibm)
0:6.8.0-1016
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1016
6.8.0-\d+(-oem)
0:6.8.0-1017
6.8.0-\d+(-gcp|-nvidia|-nvidia-64k)
0:6.8.0-1018
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1018
6.8.0-\d+(-aws)
0:6.8.0-1019
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-49
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1018
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-49
0:1.1.0+dfsg2-7.2ubuntu0.1~esm1
0:2.74.3-6ubuntu1.1
0:3.4.4-5ubuntu0.1
0:2.45.0-1ubuntu0.2+esm1
2:9.1.0016-1ubuntu7.5
0:16.6-0ubuntu0.24.04.1
0:2.8.5-1ubuntu3.2
3:4.2.11-1ubuntu1.4
0:1.31-3ubuntu3.24.04.1
0:2.46.4-0ubuntu0.24.04.1
0:2.6.1-2ubuntu0.2
0:1.3.2-5ubuntu0.24.04.1~esm1
0:3.20241112.0ubuntu0.24.04.1
0:6.4.0-1ubuntu0.1
0:1.31-3ubuntu3.24.04.2
6.8.0-\d+(-gke)
0:6.8.0-1015
6.8.0-\d+(-raspi)
0:6.8.0-1016
6.8.0-\d+(-ibm)
0:6.8.0-1017
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1017
6.8.0-\d+(-oem)
0:6.8.0-1018
6.8.0-\d+(-gcp)
0:6.8.0-1019
6.8.0-\d+(-aws)
0:6.8.0-1020
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-50
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-50
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1019
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1019
6.8.0-\d+(-gkeop)
0:6.8.0-1002
0:8.3.6-0ubuntu0.24.04.3
0:3.1.48-1ubuntu0.24.04.1
0:26.1.3-0ubuntu1~24.04.1+esm1
0:20.10.25+dfsg1-2ubuntu1+esm1
0:8.5.0-2ubuntu10.6
0:4.3.30-2ubuntu0.24.04.1~esm1
6.8.0-\d+(-gkeop)
0:6.8.0-1003
6.8.0-\d+(-gke)
0:6.8.0-1016
6.8.0-\d+(-raspi)
0:6.8.0-1017
6.8.0-\d+(-ibm)
0:6.8.0-1018
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1018
6.8.0-\d+(-oem)
0:6.8.0-1019
6.8.0-\d+(-gcp|-nvidia|-nvidia-64k)
0:6.8.0-1020
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1020
6.8.0-\d+(-aws)
0:6.8.0-1021
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-51
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-51
6.11.0-\d+(-oem)
0:6.11.0-1010
0:1.24.2-1ubuntu0.1
0:1.24.2-1ubuntu0.2
0:1.24.2-1ubuntu1.1
0:23.11-1ubuntu0.1
0:19.2.0-0ubuntu0.24.04.2
6.11.0-\d+(-oem)
0:6.11.0-1011
0:1.11.1-3ubuntu0.1
0:1.00-2ubuntu0.24.04.1
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1020
0:0.14.3~24.04ubuntu0.1
1:0.21.0+dfsg-1ubuntu0.1~esm1
0:1.2-4.1ubuntu2.24.0.4.1+esm2
0:2.46.5-0ubuntu0.24.04.1
0:20231103+dfsg1-1ubuntu0.1~esm1
3:4.2.11-1ubuntu1.5
0:3.2.7-1ubuntu1.1
0:3.2.7-1ubuntu1.2
1:2.43.0-1ubuntu7.2
0:8.0.112-0ubuntu1~24.04.1
0:8.0.112-8.0.12-0ubuntu1~24.04.1
0:8.0.12-0ubuntu1~24.04.1
0:24.02.0-1ubuntu9.2
0:4.66.2-2ubuntu0.1~esm1
0:3.12.3-1ubuntu0.4
2:9.1.0016-1ubuntu7.6
6.11.0-\d+(-oem)
0:6.11.0-1012
0:2.5.0-2ubuntu0.3
0:3.8.2-1ubuntu0.1~esm1
0:1.9.17-1ubuntu0.1~esm1
0:1.14.0+dfsg-1ubuntu0.1~esm1
4:0.9+LibO24.2.7-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.7-0ubuntu0.24.04.2
4:102.12+LibO24.2.7-0ubuntu0.24.04.2
4:24.2.7-0ubuntu0.24.04.2
0:1.0.8+dfsg-0ubuntu0.24.04.1
0:8.4.4-1.1ubuntu6.3
0:4.4.4-1ubuntu0.1~esm1
6.8.0-\d+(-gkeop)
0:6.8.0-1004
6.8.0-\d+(-gke)
0:6.8.0-1017
6.8.0-\d+(-raspi)
0:6.8.0-1018
6.8.0-\d+(-ibm)
0:6.8.0-1019
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1019
6.8.0-\d+(-gcp|-nvidia|-nvidia-64k)
0:6.8.0-1021
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1021
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1021
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-52
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-52
6.8.0-\d+(-oem)
0:6.8.0-1020
6.11.0-\d+(-oem)
0:6.11.0-1013
0:2.9.14+dfsg-1.3ubuntu3.1
1:9.18.30-0ubuntu0.24.04.2
0:3.0.20-3ubuntu0.1~esm1
0:3.1.2-1ubuntu1.2
0:8.0.41-0ubuntu0.24.04.1
0:11.0.26+4-1ubuntu1~24.04
0:17.0.14+7-1~24.04
0:21.0.6+7-1~24.04.1
0:1.20.1-6ubuntu2.3
0:4.22.1+dfsg1-2ubuntu0.24.04.1~esm1
0:2.39-0ubuntu8.4
0:3.7.7-1ubuntu0.1~esm1
2:9.1.0016-1ubuntu7.7
0:1.2.2-1ubuntu5.24.04.1
0:3.20250211.0ubuntu0.24.04.1
1:9.6p1-3ubuntu13.8
0:20.25.0+ds-2ubuntu0.1~esm1
0:6.4.5+dfsg-3ubuntu3+esm1
0:4.19.0-3ubuntu0.24.04.1
0:3.0.13-0ubuntu3.5
0:2.46.6-0ubuntu0.24.04.1
0:3.12.3-1ubuntu0.5
0:3.8.3-1.1ubuntu3.3
1:4.1.48-9ubuntu0.1~esm1
0:1.24.0-2ubuntu7.3
0:4.1-7ubuntu0.1
1:2.66-5ubuntu2.2
0:1.3.8.b+dfsg-1ubuntu0.1
2:21.1.12-1ubuntu1.2
2:23.2.6-1ubuntu0.4
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-54
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-54
0:2.9.14+dfsg-1.3ubuntu3.2
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1022
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1022
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1020
6.8.0-\d+(-raspi)
0:6.8.0-1019
6.8.0-\d+(-gkeop)
0:6.8.0-1006
6.8.0-\d+(-gke)
0:6.8.0-1019
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1024
0:2.42-4ubuntu2.4
0:1.2-4.1ubuntu2.24.0.4.1+esm3
0:1.15.0-1ubuntu0.24.04.1
6.11.0-\d+(-oem)
0:6.11.0-1015
6.8.0-\d+(-aws)
0:6.8.0-1023
0:10.2.0+dfsg-1ubuntu0.24.04.1~esm1
1:25.3.2.8+dfsg-1ubuntu4.1
0:1.20.1-6ubuntu2.5
0:16.8-0ubuntu0.24.04.1
0:2.0.16-3ubuntu0.1
2:2.10-21ubuntu0.2
0:0.29.0.gfm.6-6ubuntu0.24.04.1~esm1
0:2.2.1+dfsg1-3.1ubuntu0.1~esm2
5:7.0.15-1ubuntu0.24.04.1
6.11.0-\d+(-oem)
0:6.11.0-1016
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-19
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-55
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-55
6.8.0-\d+(-raspi)
0:6.8.0-1020
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1021
6.8.0-\d+(-aws)
0:6.8.0-1024
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1023
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1023
6.8.0-\d+(-gkeop)
0:6.8.0-1007
6.8.0-\d+(-gke)
0:6.8.0-1020
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1025
3:4.2.11-1ubuntu1.6
0:6.2.7-1+deb11u1build0.24.04.1
4:0.9+LibO24.2.7-0ubuntu0.24.04.3
4:1.2.0+LibO24.2.7-0ubuntu0.24.04.3
4:102.12+LibO24.2.7-0ubuntu0.24.04.3
4:24.2.7-0ubuntu0.24.04.3
0:2.11.5+dfsg1-1ubuntu0.1~esm1
0:3.1.2-1ubuntu1.3
0:8.0.114-0ubuntu1~24.04.1
0:8.0.114-8.0.14-0ubuntu1~24.04.1
0:8.0.14-0ubuntu1~24.04.1
0:0.25.0~rc1-1ubuntu0.1~esm1
0:3.1.18~ds-1ubuntu0.1~esm1
0:3.6.2-2ubuntu0.24.04.1~esm1
1:1.2020.2+ds-3ubuntu1.1
0:2.1.0-1ubuntu0.24.04.1
0:6.2-1ubuntu0.24.04.1~esm1
0:0.9.7+dfsg-2ubuntu0.1~esm1
0:1.1.39-0exp1ubuntu0.24.04.1
0:7.2.8+dfsg1-0ubuntu0.24.04.2
0:1.1.39-0exp1ubuntu0.24.04.2
0:2.6.0-1ubuntu0.24.04.1~esm1
0:0.6.12-2ubuntu0.24.04.1
0:3.2.1-4.1ubuntu0.24.04.1
0:2.2.7-1ubuntu0.2
0:0.2.42-2ubuntu0.24.04.1~esm1
0:0.190-1.1ubuntu0.1
0:45+dfsg-1ubuntu0.1~esm1
0:2.11.5+dfsg1-1ubuntu0.1~esm2
0:4.97-4ubuntu4.3
0:1.6.24~ds1-1ubuntu1.2+esm1
0:1.7.24-0ubuntu1~24.04.2
0:9.6.10+dfsg-1ubuntu0.1~esm1
1:10.11.11-0ubuntu0.24.04.2
0:4.3.1-1ubuntu0.24.04.1
0:10.02.1~dfsg1-0ubuntu7.5
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-21
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-21
6.11.0-\d+(-lowlatency|-lowlatency-64k)
0:6.11.0-1011
6.11.0-\d+(-oem)
0:6.11.0-1017
6.8.0-\d+(-gkeop)
0:6.8.0-1008
6.8.0-\d+(-gke)
0:6.8.0-1021
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1022
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1024
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1024
6.8.0-\d+(-aws)
0:6.8.0-1025
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1026
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-56
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-56
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-56
6.8.1-\d+(-realtime)
0:6.8.1-1018
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1025
6.8.0-\d+(-ibm)
0:6.8.0-1022
6.8.0-\d+(-oem)
0:6.8.0-1024
0:2.48.0-0ubuntu0.24.04.1
0:24.03.2-0ubuntu0.24.04.2
0:1.2.20-8.1ubuntu0.24.04.1
0:3.12.1-1ubuntu1.2
0:8.3.6-0ubuntu0.24.04.4
6.8.0-\d+(-gkeop)
0:6.8.0-1009
6.8.0-\d+(-gke)
0:6.8.0-1022
6.8.0-\d+(-ibm)
0:6.8.0-1023
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1023
6.8.0-\d+(-oem)
0:6.8.0-1025
6.8.0-\d+(-aws)
0:6.8.0-1026
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1027
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-57
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-57
6.8.1-\d+(-realtime)
0:6.8.1-1019
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1025
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1025
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1026
0:1.15.0-1ubuntu0.24.04.1+esm1
0:2.6.12-0ubuntu0.24.04.3
0:2.4.4-2ubuntu17.2
0:5.6.1+really5.4.5-1ubuntu0.2
0:3.2.3-1ubuntu0.24.04.5
2:9.1.0016-1ubuntu7.8
0:2.42-4ubuntu2.5
0:2.6.1-2ubuntu0.3
1:25.3.2.8+dfsg-1ubuntu4.2
0:24.02.0-1ubuntu9.3
0:8.0.115-0ubuntu1~24.04.1
0:8.0.115-8.0.15-0ubuntu1~24.04.1
0:8.0.15-0ubuntu1~24.04.1
0:2.8.5-1ubuntu3.3
0:2.74.3-6ubuntu1.2
0:3.4.4-5ubuntu0.2
0:1.4+really1.3.42-1.1ubuntu0.1~esm1
0:5.38.2-3.2ubuntu0.1
0:3.21.12-8.2ubuntu0.1
0:2.48.1-0ubuntu0.24.04.1
0:3.2.1+dfsg-1ubuntu0.24.04.1~esm1
0:23.01+dfsg-11ubuntu0.1~esm1
0:2021.03.27-1ubuntu0.1~esm1
0:2.0.18-1ubuntu0.1~esm1
1:25.3.2.8+dfsg-1ubuntu4.3
6.11.0-\d+(-lowlatency|-lowlatency-64k)
0:6.11.0-1012
6.11.0-\d+(-oem)
0:6.11.0-1020
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-24
0:2.4.15.1-1ubuntu0.1
0:42.1-2ubuntu0.24.04.1
0:42.2-1ubuntu0.24.04.1
6.11.0-\d+(-azure|-azure-fde)
0:6.11.0-1013
6.8.0-\d+(-ibm)
0:6.8.0-1024
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1024
6.8.0-\d+(-oem)
0:6.8.0-1026
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1026
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1026
6.8.0-\d+(-aws)
0:6.8.0-1027
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1027
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-58
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-58
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-58
6.8.0-\d+(-gkeop)
0:6.8.0-1010
6.8.0-\d+(-gke)
0:6.8.0-1023
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1028
6.8.1-\d+(-realtime)
0:6.8.1-1020
0:3.7.2-2ubuntu0.4
0:3.8.0-2ubuntu0.1~esm1
1:9.6p1-3ubuntu13.11
0:6.4.12-2.2ubuntu1+esm1
0:2.9.14+dfsg-1.3ubuntu3.3
6.8.0-\d+(-azure-nvidia)
0:6.8.0-1014
0:24.02.0-1ubuntu9.4
0:1.22.1+ds-1ubuntu0.24.04.1~esm1
0:10.02.1~dfsg1-0ubuntu7.6
0:20.10.25+dfsg1-2ubuntu1+esm2
0:2.11.1-1ubuntu0.1~esm2
0:3.1.7-1ubuntu3.1
0:8.0.42-0ubuntu0.24.04.1
0:8u452-ga~us1-0ubuntu1~24.04
0:11.0.27+6~us1-0ubuntu1~24.04
0:17.0.15+6~us1-0ubuntu1~24.04
0:21.0.7+6~us1-0ubuntu1~24.04
0:0.21.2-2.1ubuntu0.24.04.1
0:2.4.2-2.1ubuntu0.24.04.1
6.11.0-\d+(-lowlatency|-lowlatency-64k)
0:6.11.0-1013
6.11.0-\d+(-gcp|-gcp-64k)
0:6.11.0-1014
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-25
0:2.74.3-6ubuntu1.3
0:2.74.3-6ubuntu1.4
0:3.4.4-5ubuntu0.3
6.11.0-\d+(-oem)
0:6.11.0-1021
6.8.0-\d+(-gkeop)
0:6.8.0-1011
6.8.0-\d+(-gke)
0:6.8.0-1024
6.8.0-\d+(-ibm)
0:6.8.0-1025
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1025
6.8.0-\d+(-oem)
0:6.8.0-1027
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1027
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1027
6.8.0-\d+(-aws)
0:6.8.0-1028
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1029
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-59
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-59
6.8.1-\d+(-realtime)
0:6.8.1-1021
6.8.0-\d+(-raspi)
0:6.8.0-1024
0:1.3.2-2ubuntu0.24.04.1~esm1
6.11.0-\d+(-azure|-azure-fde)
0:6.11.0-1014
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1028
3:4.2.11-1ubuntu1.7
0:0.14.0-1ubuntu0.24.04.1
4:0.9+LibO24.2.7-0ubuntu0.24.04.4
4:1.2.0+LibO24.2.7-0ubuntu0.24.04.4
4:102.12+LibO24.2.7-0ubuntu0.24.04.4
4:24.2.7-0ubuntu0.24.04.4
0:20220623.1-3.1ubuntu3.2
0:2.2.7-1ubuntu0.3
2:12.4.5-1~ubuntu0.24.04.2
0:8.0.116-0ubuntu1~24.04.1
0:8.0.116-8.0.16-0ubuntu1~24.04.1
0:8.0.16-0ubuntu1~24.04.1
6.8.0-\d+(-ibm)
0:6.8.0-1026
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1026
6.8.0-\d+(-aws)
0:6.8.0-1029
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-60
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-60
6.8.1-\d+(-realtime)
0:6.8.1-1022
6.8.0-\d+(-oem)
0:6.8.0-1028
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1029
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1028
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1028
6.8.0-\d+(-gke)
0:6.8.0-1025
6.8.0-\d+(-gkeop)
0:6.8.0-1012
6.8.0-\d+(-gcp|-gcp-64k)
0:6.8.0-1030
0:16.9-0ubuntu0.24.04.1
6.11.0-\d+(-azure|-azure-fde|-gcp|-gcp-64k)
0:6.11.0-1015
6.11.0-\d+(-oem)
0:6.11.0-1022
6.11.0-\d+(-generic|-generic-64k)
0:6.11.0-26
6.11.0-\d+(-lowlatency|-lowlatency-64k)
0:6.11.0-1014
6.8.0-\d+(-azure-nvidia)
0:6.8.0-1016
6.8.0-\d+(-raspi-realtime)
0:6.8.0-2023
6.8.0-\d+(-raspi)
0:6.8.0-1028
0:10.1.16-1ubuntu0.1~esm1
0:9.0.70-2ubuntu0.1+esm1
0:3.45.1-1ubuntu2.3
0:2.80.0-6ubuntu3.4
0:3.20250512.0ubuntu0.24.04.1
2:7.0-2ubuntu0.1
0:2.10-0.1ubuntu4.1
0:2.10-0.1ubuntu4.4
7:6.1.1-3ubuntu5+esm3
0:1.20.1-6ubuntu2.6
0:2.74.3-6ubuntu1.5
0:3.4.4-5ubuntu0.4
0:68.1.2-2ubuntu1.2
0:2.28.1-0ubuntu3.6
0:2.28.1-0ubuntu3.7
0:6.4.0-1ubuntu0.2
1:10.11.13-0ubuntu0.24.04.1
0:3.8.0-2ubuntu1
0:1.14.0-1ubuntu2.2
3:4.2.11-1ubuntu1.8
0:1.009~3.4.1+dfsg-3+deb12u1build0.24.04.1
0:3.4.1+dfsg-3+deb12u1build0.24.04.1
0:4.6.1+dfsg1-4+deb12u1build0.24.04.1
0:1.24.2-1ubuntu4+esm1
0:255.4-1ubuntu8.8
0:3.20250311.1ubuntu0.24.04.1
0:10.1.16-1ubuntu0.1~esm2
0:9.0.70-2ubuntu0.1+esm2
0
104
0
105
0
106
0
107
0
108
0
109
0
110
0
111
0
112
libssl3t64
libssl-dev
openssl
libssl-doc
python3-cryptography
python-cryptography-doc
libodbc2
unixodbc-dev
unixodbc-common
unixodbc
odbcinst
libodbcinst2
libodbccr2
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl3t64-gnutls
libcurl4-doc
curl
libcurl4t64
apache2-data
libapache2-mod-md
apache2-utils
apache2-dev
apache2-suexec-pristine
apache2-suexec-custom
apache2
apache2-doc
libapache2-mod-proxy-uwsgi
apache2-ssl-dev
apache2-bin
libgnutls-openssl27t64
libgnutls-dane0t64
libgnutls28-dev
gnutls-doc
libgnutls30t64
gnutls-bin
libvirt-clients-qemu
libvirt-dev
libvirt-wireshark
libvirt-daemon-driver-qemu
libvirt-login-shell
libvirt-daemon-system-sysv
libvirt-daemon-driver-lxc
libnss-libvirt
libvirt-daemon
libvirt-daemon-config-nwfilter
libvirt-daemon-driver-storage-iscsi-direct
libvirt-daemon-config-network
libvirt-l10n
libvirt-clients
libvirt-daemon-driver-storage-zfs
libvirt-daemon-driver-xen
libvirt-daemon-driver-vbox
libvirt-daemon-driver-storage-gluster
libvirt-daemon-system
libvirt0
libvirt-daemon-system-systemd
libvirt-sanlock
libvirt-daemon-driver-storage-rbd
libvirt-doc
klibc-utils
libklibc
libklibc-dev
libc-bin
glibc-doc
locales-all
libc6-i386
libc6-s390
libc6-dev-i386
libc6-dev-s390
libc6-dev
libc6-amd64
libc6-x32
libc6-dev-amd64
libc-dev-bin
libc6
nscd
libc-devtools
glibc-source
libc6-dev-x32
locales
python3-pil.imagetk
python-pil-doc
python3-pil
google-guest-agent
google-osconfig-agent
libnghttp2-14
libnghttp2-doc
libnghttp2-dev
nghttp2-proxy
nghttp2
nghttp2-client
nghttp2-server
less
libwinpr3-dev
libfreerdp-server3-3
winpr3-utils
libfreerdp-shadow3-3
freerdp3-dev
freerdp3-shadow-x11
libfreerdp3-3
libfreerdp-client3-3
freerdp3-wayland
libwinpr-tools3-3
libfreerdp-shadow-subsystem3-3
freerdp3-x11
libwinpr3-3
anope
libvirt-clients-qemu
libvirt-dev
libvirt-wireshark
libvirt-daemon-driver-qemu
libvirt-login-shell
libvirt-daemon-system-sysv
libvirt-daemon-driver-lxc
libnss-libvirt
libvirt-daemon
libvirt-daemon-config-nwfilter
libvirt-daemon-driver-storage-iscsi-direct
libvirt-daemon-config-network
libvirt-l10n
libvirt-clients
libvirt-daemon-driver-storage-zfs
libvirt-daemon-driver-xen
libvirt-daemon-driver-vbox
libvirt-daemon-driver-storage-gluster
libvirt-daemon-system
libvirt0
libvirt-daemon-system-systemd
libvirt-sanlock
libvirt-daemon-driver-storage-rbd
libvirt-doc
gir1.2-glib-2.0
libgirepository-2.0-dev
gir1.2-girepository-3.0-dev
libglib2.0-0t64
libglib2.0-tests
gir1.2-glib-2.0-dev
libgirepository-2.0-0
gir1.2-girepository-3.0
libglib2.0-data
libglib2.0-doc
libglib2.0-bin
libglib2.0-dev
libglib2.0-dev-bin
fossil
python-sqlparse-doc
python3-sqlparse
sqlformat
dotnet-sdk-8.0
netstandard-targeting-pack-2.1-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
dotnet8
aspnetcore-runtime-8.0
dotnet-apphost-pack-8.0
dotnet-hostfxr-8.0
aspnetcore-runtime-dbg-8.0
dotnet-runtime-dbg-8.0
dotnet-runtime-8.0
dotnet-host-8.0
aspnetcore-targeting-pack-8.0
dotnet-targeting-pack-8.0
python3-idna
libcjson-dev
libcjson1
gnome-remote-desktop
python-jinja2-doc
python3-jinja2
gir1.2-javascriptcoregtk-4.1
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-bin
libwebkitgtk-doc
gir1.2-webkit2-4.1
libwebkitgtk-6.0-dev
libjavascriptcoregtk-4.1-0
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkit2gtk-4.0-doc
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-dev
gir1.2-javascriptcoregtk-6.0
webkit2gtk-driver
libjavascriptcoregtk-4.0-bin
libwebkitgtk-6.0-4
gir1.2-webkit-6.0
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
libreoffice-evolution
libreoffice-help-en-gb
libreoffice-librelogo
libreoffice-l10n-ml
libreoffice-help-zh-cn
libreoffice-subsequentcheckbase
libreoffice-l10n-mk
libreoffice-help-id
libreoffice-l10n-mr
libreoffice-style-tango
libreoffice-help-pt-br
libreofficekit-data
libreoffice-core
libreoffice-help-it
libreoffice-l10n-uk
libreoffice-l10n-fr
libreoffice-gnome
libreoffice-l10n-fi
libreoffice-help-nl
libreoffice-uiconfig-math
libreoffice-l10n-uz
libreoffice
libreoffice-sdbc-mysql
libreoffice-l10n-nb
libreoffice-l10n-mn
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-uiconfig-writer
libreoffice-l10n-nn
libreoffice-help-fi
libreoffice-l10n-dz
libreoffice-l10n-nr
libreoffice-help-fr
libreoffice-report-builder-bin
libofficebean-java
libreoffice-qt6
libreoffice-l10n-vi
libreoffice-l10n-nso
libreoffice-qt5
libreoffice-nogui
libreoffice-math-nogui
libreoffice-style-karasa-jaga
libreoffice-l10n-ve
libreoffice-l10n-gu
libreoffice-help-om
libreoffice-l10n-gl
python3-access2base
libreoffice-help-en-us
libreoffice-l10n-ga
libuno-cppu3t64
liblibreofficekitgtk
libreoffice-l10n-gd
libreoffice-help-km
libreoffice-l10n-kn
libreoffice-help-ko
libreoffice-l10n-st
libreoffice-dev-common
libreoffice-l10n-sr
libreoffice-help-cs
libreoffice-l10n-ts
libreoffice-l10n-sv
libreoffice-script-provider-bsh
gir1.2-lokdocview-0.1
ure-java
libreoffice-report-builder-bin-nogui
libreoffice-l10n-ka
libreoffice-uiconfig-common
libridl-java
libreoffice-help-ca
libreoffice-l10n-zh-tw
libreoffice-l10n-sl
libreoffice-l10n-sk
libreoffice-style-breeze
libreoffice-l10n-si
libreoffice-l10n-da
libreofficekit-dev
libreoffice-l10n-de
libreoffice-common
libreoffice-help-pl
libreoffice-l10n-pa-in
libuno-purpenvhelpergcc3-3t64
libreoffice-uiconfig-report-builder
libreoffice-help-pt
libreoffice-base-nogui
libreoffice-gtk3
libreoffice-math
libreoffice-help-vi
libreoffice-gtk4
libreoffice-l10n-tr
libreoffice-help-hi
libreoffice-l10n-gug
libreoffice-sdbc-hsqldb
libreoffice-draw-nogui
libreoffice-calc
libreoffice-base-drivers
libreoffice-style-colibre
libreoffice-l10n-ta
libreoffice-sdbc-firebird
libreoffice-l10n-tg
libreoffice-l10n-te
libreoffice-l10n-th
libreoffice-l10n-id
libreoffice-l10n-lv
libreoffice-help-hu
libreoffice-l10n-lt
libreoffice-l10n-ss
libunoloader-java
libreoffice-uiconfig-impress
libreoffice-l10n-eu
libreoffice-l10n-et
libreoffice-script-provider-js
libreoffice-l10n-es
libreoffice-l10n-el
libreoffice-l10n-eo
libreoffice-style-sifr
libreoffice-l10n-zh-cn
libreoffice-l10n-ug
libreoffice-smoketest-data
libreoffice-l10n-ko
libreoffice-l10n-zu
libreoffice-impress
libreoffice-java-common
libreoffice-help-eu
libreoffice-help-et
libreoffice-help-es
libreoffice-l10n-km
libreoffice-uiconfig-draw
libreoffice-help-el
libreoffice-uiconfig-calc
libreoffice-l10n-kk
libreoffice-dev-gui
libreoffice-l10n-be
libreoffice-l10n-szl
libreoffice-l10n-bg
libreoffice-l10n-tn
libreoffice-l10n-bn
libreoffice-plasma
libreoffice-help-ja
libreoffice-l10n-br
libreoffice-l10n-bs
liblibreoffice-java
libunoil-java
libreoffice-style-yaru
libreoffice-base-core
libreoffice-help-ru
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-is
libreoffice-style-elementary
python3-uno
libreoffice-l10n-fa
libreoffice-l10n-am
libreoffice-l10n-ro
libreoffice-l10n-en-za
libreoffice-style-sukapura
libreoffice-l10n-ca
libreoffice-help-sl
libreoffice-calc-nogui
libreoffice-help-sk
libreoffice-help-sv
libreoffice-l10n-cs
python3-scriptforge
libreoffice-dev-doc
libreoffice-help-common
libreoffice-l10n-za
libreoffice-l10n-cy
libreoffice-l10n-oc
libjurt-java
libreoffice-base
libreoffice-help-gl
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pt-br
libreoffice-l10n-kmr
uno-libs-private
libreoffice-l10n-ast
libreoffice-l10n-hu
libreoffice-l10n-hr
libreoffice-script-provider-python
libreoffice-writer-nogui
libreoffice-l10n-hy
libreoffice-l10n-he
libreoffice-officebean
libreoffice-dev
libreoffice-report-builder
libuno-sal3t64
libreoffice-help-tr
libreoffice-l10n-hi
libreoffice-kf5
libreoffice-help-dz
libreoffice-l10n-pt
libreoffice-l10n-ja
libreoffice-l10n-pl
libreoffice-sdbc-postgresql
libreoffice-writer
libreoffice-help-de
libreoffice-help-da
libreoffice-uiconfig-base
ure
libreoffice-impress-nogui
libjuh-java
libreoffice-l10n-it
libreoffice-l10n-xh
libreoffice-l10n-af
libuno-cppuhelpergcc3-3t64
libreoffice-help-zh-tw
libreoffice-l10n-en-gb
libreoffice-draw
libuno-salhelpergcc3-3t64
libreoffice-core-nogui
libreoffice-l10n-as
libreoffice-l10n-ar
libreoffice-l10n-in
amavisd-new-postfix
amavisd-new
unbound
python3-unbound
libunbound8
unbound-anchor
unbound-host
libunbound-dev
git
gitweb
git-gui
git-daemon-sysvinit
gitk
git-all
git-mediawiki
git-daemon-run
git-man
git-doc
git-svn
git-cvs
git-email
frr
frr-rpki-rtrlib
frr-snmp
frr-doc
frr-pythontools
libtss2-esys-3.0.2-0t64
libtss2-sys1t64
libtss2-mu-4.0.1-0t64
libtss2-tcti-spi-helper0t64
libtss2-tcti-libtpms0t64
libtss2-doc
libtss2-tcti-swtpm0t64
libtss2-tcti-device0t64
libtss2-rc0t64
libtss2-fapi1t64
libtss2-tcti-mssim0t64
libtss2-policy0t64
libtss2-tcti-pcap0t64
libtss2-tctildr0t64
libtss2-dev
libtss2-tcti-cmd0t64
intel-microcode
gstreamer1.0-plugins-base
libgstreamer-plugins-base1.0-0
gstreamer1.0-x
libgstreamer-gl1.0-0
gstreamer1.0-gl
libgstreamer-plugins-base1.0-dev
gir1.2-gst-plugins-base-1.0
gstreamer1.0-alsa
gstreamer1.0-plugins-base-apps
python3-werkzeug
python-werkzeug-doc
python3-pymysql
python-pymysql-doc
postgresql-server-dev-16
libecpg6
postgresql-pltcl-16
libpq-dev
postgresql-16
libpgtypes3
libecpg-dev
postgresql-plperl-16
libpq5
postgresql-client-16
postgresql-doc-16
postgresql-plpython3-16
libecpg-compat3
ffmpeg
ffmpeg-doc
libavcodec-dev
libavcodec-extra
libavcodec-extra60
libavcodec60
libavdevice-dev
libavdevice60
libavfilter-dev
libavfilter-extra
libavfilter-extra9
libavfilter9
libavformat-dev
libavformat-extra
libavformat-extra60
libavformat60
libavutil-dev
libavutil58
libpostproc-dev
libpostproc57
libswresample-dev
libswresample4
libswscale-dev
libswscale7
libc-bin
glibc-doc
libc6-i386
libc6-s390
libc6-dev-i386
nscd
libc6-dev-x32
libc6-dev
libc6-amd64
libc6-x32
libc6-dev-amd64
libc-dev-bin
libc6
locales-all
libc-devtools
glibc-source
libc6-dev-s390
locales
libarchive-dev
libarchive13t64
libarchive-tools
libgdk-pixbuf-2.0-dev
gdk-pixbuf-tests
libgdk-pixbuf2.0-common
libgdk-pixbuf2.0-bin
libgdk-pixbuf2.0-doc
gir1.2-gdkpixbuf-2.0
libgdk-pixbuf-2.0-0
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jre-headless
openjdk-8-jre
openjdk-8-jdk-headless
openjdk-8-source
openjdk-8-jre-zero
openjdk-8-demo
libvpx-dev
libvpx9
libvpx-doc
vpx-tools
libaom-doc
libaom-dev
libaom3
aom-tools
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
mysql-client
libmysqlclient-dev
mysql-testsuite-8.0
mysql-router
mysql-server
libmysqlclient21
mysql-client-core-8.0
mysql-server-core-8.0
mysql-server-8.0
mysql-testsuite
mysql-client-8.0
mysql-source-8.0
libtiff-opengl
libtiff5-dev
libtiff-dev
libtiffxx6
libtiff6
libtiff-tools
libtiff-doc
libndp0
libndp-dev
libndp-tools
virtuoso-vad-demo
virtuoso-vad-sparqldemo
virtuoso-vad-rdfmappers
virtuoso-vsp-startpage
virtuoso-vad-isparql
virtuoso-opensource-7-bin
virtuoso-server
virtuoso-vad-tutorial
virtuoso-minimal
virtuoso-opensource
virtuoso-vad-ods
virtuoso-opensource-7
virtuoso-vad-syncml
virtuoso-vad-doc
virtuoso-vad-conductor
libvirtodbc0
libvirtuoso5.5-cil
virtuoso-vad-bpel
virtuoso-opensource-7-common
libvte-2.91-gtk4-dev
libvte-2.91-common
gir1.2-vte-3.91
gir1.2-vte-2.91
libvte-2.91-doc
libvte-2.91-gtk4-0
libvte-2.91-0
libvte-2.91-gtk4-doc
libvte-2.91-dev
ghostscript
libgs10-common
libgs10
libgs-common
libgs-dev
ghostscript-doc
libsss-certmap-dev
libipa-hbac-dev
sssd-ad
libsss-sudo
libsss-nss-idmap0
libnss-sss
sssd-ipa
sssd-passkey
libipa-hbac0t64
libsss-idmap-dev
python3-libsss-nss-idmap
sssd-common
python3-sss
libpam-sss
sssd
libsss-idmap0
sssd-idp
libsss-nss-idmap-dev
sssd-kcm
libsss-certmap0
python3-libipa-hbac
sssd-ldap
sssd-tools
sssd-ad-common
sssd-krb5-common
sssd-dbus
sssd-krb5
sssd-proxy
ruby-rack
ruby3.2
ruby3.2-doc
ruby3.2-dev
libruby3.2
mariadb-plugin-provider-lzo
mariadb-plugin-cracklib-password-check
mariadb-backup
mariadb-plugin-connect
mariadb-plugin-spider
libmariadb-dev
libmariadb3
mariadb-plugin-s3
mariadb-plugin-provider-bzip2
mariadb-plugin-provider-lzma
mariadb-plugin-provider-snappy
mariadb-client
libmariadbd19t64
mariadb-server-core
mariadb-server-10.5
mariadb-test-data
mariadb-plugin-provider-lz4
mariadb-client-core
mariadb-plugin-rocksdb
mariadb-plugin-gssapi-client
mariadb-plugin-mroonga
libmariadbd-dev
libmariadb-dev-compat
mariadb-plugin-gssapi-server
mariadb-server
mariadb-common
mariadb-plugin-hashicorp-key-management
mariadb-plugin-oqgraph
mariadb-test
php8.3-cgi
php8.3-xsl
php8.3-fpm
php8.3-phpdbg
php8.3-zip
php8.3-curl
php8.3-ldap
php8.3-gmp
php8.3-sqlite3
php8.3-gd
php8.3-common
php8.3-enchant
php8.3-odbc
php8.3-cli
php8.3-mbstring
php8.3-pgsql
php8.3-mysql
php8.3-dba
libapache2-mod-php8.3
php8.3-soap
php8.3-opcache
php8.3-sybase
php8.3-pspell
libphp8.3-embed
php8.3-bz2
php8.3-dev
php8.3
php8.3-tidy
php8.3-interbase
php8.3-readline
php8.3-intl
php8.3-imap
php8.3-xml
php8.3-bcmath
php8.3-snmp
plasma-workspace-dev
libweather-ion7
libkfontinst5
libcolorcorrect5
libkworkspace5-5
plasma-workspace-data
plasma-workspace-wayland
sddm-theme-breeze
libplasma-geolocation-interface5
libnotificationmanager1
libkfontinstui5
libtaskmanager6
plasma-workspace
libcups2-dev
cups-bsd
cups-common
cups-core-drivers
cups-server-common
cups-client
libcupsimage2t64
libcupsimage2-dev
cups-ipp-utils
cups-ppdc
cups
libcups2t64
cups-daemon
libcups2-dev
cups-bsd
cups-common
cups-core-drivers
cups-server-common
cups-client
libcupsimage2t64
libcupsimage2-dev
cups-ipp-utils
cups-ppdc
cups
libcups2t64
cups-daemon
netplan.io
netplan-generator
libnetplan1
python3-netplan
libnetplan-dev
netplan.io
netplan-generator
libnetplan1
python3-netplan
libnetplan-dev
wget
libiso9660-dev
libiso9660-11t64
libcdio-utils
libcdio19t64
libiso9660++0t64
libudf-dev
libcdio++1t64
libiso9660++-dev
libudf0t64
libcdio++-dev
libcdio-dev
openssh-client
openssh-server
ssh-askpass-gnome
ssh
openssh-tests
openssh-sftp-server
openvpn
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
libreoffice-evolution
libreoffice-help-en-gb
libreoffice-librelogo
libreoffice-l10n-ml
libreoffice-help-zh-cn
libreoffice-subsequentcheckbase
libreoffice-l10n-mk
libreoffice-help-id
libreoffice-l10n-mr
libreoffice-style-tango
libreoffice-help-pt-br
libreofficekit-data
libreoffice-core
libreoffice-help-it
libreoffice-l10n-uk
libreoffice-l10n-fr
libreoffice-gnome
libreoffice-l10n-fi
libreoffice-help-nl
libreoffice-uiconfig-math
libreoffice-l10n-uz
libreoffice
libreoffice-sdbc-mysql
libreoffice-l10n-nb
libreoffice-l10n-mn
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-uiconfig-writer
libreoffice-l10n-nn
libreoffice-help-fi
libreoffice-l10n-dz
libreoffice-l10n-nr
libreoffice-help-fr
libreoffice-report-builder-bin
libofficebean-java
libreoffice-qt6
libreoffice-l10n-vi
libreoffice-l10n-nso
libreoffice-qt5
libreoffice-nogui
libreoffice-math-nogui
libreoffice-style-karasa-jaga
libreoffice-l10n-ve
libreoffice-l10n-gu
libreoffice-help-om
libreoffice-l10n-gl
python3-access2base
libreoffice-help-en-us
libreoffice-l10n-ga
libuno-cppu3t64
liblibreofficekitgtk
libreoffice-l10n-gd
libreoffice-help-km
libreoffice-l10n-kn
libreoffice-help-ko
libreoffice-l10n-st
libreoffice-dev-common
libreoffice-l10n-sr
libreoffice-help-cs
libreoffice-l10n-ts
libreoffice-l10n-sv
libreoffice-script-provider-bsh
gir1.2-lokdocview-0.1
ure-java
libreoffice-report-builder-bin-nogui
libreoffice-l10n-ka
libreoffice-uiconfig-common
libridl-java
libreoffice-help-ca
libreoffice-l10n-zh-tw
libreoffice-l10n-sl
libreoffice-l10n-sk
libreoffice-style-breeze
libreoffice-l10n-si
libreoffice-l10n-da
libreofficekit-dev
libreoffice-l10n-de
libreoffice-common
libreoffice-help-pl
libreoffice-l10n-pa-in
libuno-purpenvhelpergcc3-3t64
libreoffice-uiconfig-report-builder
libreoffice-help-pt
libreoffice-base-nogui
libreoffice-gtk3
libreoffice-math
libreoffice-help-vi
libreoffice-gtk4
libreoffice-l10n-tr
libreoffice-help-hi
libreoffice-l10n-gug
libreoffice-sdbc-hsqldb
libreoffice-draw-nogui
libreoffice-calc
libreoffice-base-drivers
libreoffice-style-colibre
libreoffice-l10n-ta
libreoffice-sdbc-firebird
libreoffice-l10n-tg
libreoffice-l10n-te
libreoffice-l10n-th
libreoffice-l10n-id
libreoffice-l10n-lv
libreoffice-help-hu
libreoffice-l10n-lt
libreoffice-l10n-ss
libunoloader-java
libreoffice-uiconfig-impress
libreoffice-l10n-eu
libreoffice-l10n-et
libreoffice-script-provider-js
libreoffice-l10n-es
libreoffice-l10n-el
libreoffice-l10n-eo
libreoffice-style-sifr
libreoffice-l10n-zh-cn
libreoffice-l10n-ug
libreoffice-smoketest-data
libreoffice-l10n-ko
libreoffice-l10n-zu
libreoffice-impress
libreoffice-java-common
libreoffice-help-eu
libreoffice-help-et
libreoffice-help-es
libreoffice-l10n-km
libreoffice-uiconfig-draw
libreoffice-help-el
libreoffice-uiconfig-calc
libreoffice-l10n-kk
libreoffice-dev-gui
libreoffice-l10n-be
libreoffice-l10n-szl
libreoffice-l10n-bg
libreoffice-l10n-tn
libreoffice-l10n-bn
libreoffice-plasma
libreoffice-help-ja
libreoffice-l10n-br
libreoffice-l10n-bs
liblibreoffice-java
libunoil-java
libreoffice-style-yaru
libreoffice-base-core
libreoffice-help-ru
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-is
libreoffice-style-elementary
python3-uno
libreoffice-l10n-fa
libreoffice-l10n-am
libreoffice-l10n-ro
libreoffice-l10n-en-za
libreoffice-style-sukapura
libreoffice-l10n-ca
libreoffice-help-sl
libreoffice-calc-nogui
libreoffice-help-sk
libreoffice-help-sv
libreoffice-l10n-cs
python3-scriptforge
libreoffice-dev-doc
libreoffice-help-common
libreoffice-l10n-za
libreoffice-l10n-cy
libreoffice-l10n-oc
libjurt-java
libreoffice-base
libreoffice-help-gl
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pt-br
libreoffice-l10n-kmr
uno-libs-private
libreoffice-l10n-ast
libreoffice-l10n-hu
libreoffice-l10n-hr
libreoffice-script-provider-python
libreoffice-writer-nogui
libreoffice-l10n-hy
libreoffice-l10n-he
libreoffice-officebean
libreoffice-dev
libreoffice-report-builder
libuno-sal3t64
libreoffice-help-tr
libreoffice-l10n-hi
libreoffice-kf5
libreoffice-help-dz
libreoffice-l10n-pt
libreoffice-l10n-ja
libreoffice-l10n-pl
libreoffice-sdbc-postgresql
libreoffice-writer
libreoffice-help-de
libreoffice-help-da
libreoffice-uiconfig-base
ure
libreoffice-impress-nogui
libjuh-java
libreoffice-l10n-it
libreoffice-l10n-xh
libreoffice-l10n-af
libuno-cppuhelpergcc3-3t64
libreoffice-help-zh-tw
libreoffice-l10n-en-gb
libreoffice-draw
libuno-salhelpergcc3-3t64
libreoffice-core-nogui
libreoffice-l10n-as
libreoffice-l10n-ar
libreoffice-l10n-in
0:
libvirtodbc0
libvirtuoso5.5-cil
virtuoso-minimal
virtuoso-opensource
virtuoso-opensource-7
virtuoso-opensource-7-bin
virtuoso-opensource-7-common
virtuoso-server
virtuoso-vad-bpel
virtuoso-vad-conductor
virtuoso-vad-demo
virtuoso-vad-doc
virtuoso-vad-isparql
virtuoso-vad-ods
virtuoso-vad-rdfmappers
virtuoso-vad-sparqldemo
virtuoso-vad-syncml
virtuoso-vad-tutorial
virtuoso-vsp-startpage
cinder-api
cinder-backup
cinder-common
cinder-scheduler
cinder-volume
python3-cinder
cinder-api
cinder-backup
cinder-common
cinder-scheduler
cinder-volume
python3-cinder
glance
glance-api
glance-common
python-glance-doc
python3-glance
nova-ajax-console-proxy
nova-api
nova-api-metadata
nova-api-os-compute
nova-api-os-volume
nova-cells
nova-common
nova-compute
nova-compute-ironic
nova-compute-kvm
nova-compute-libvirt
nova-compute-lxc
nova-compute-qemu
nova-compute-vmware
nova-compute-xen
nova-conductor
nova-doc
nova-novncproxy
nova-scheduler
nova-serialproxy
nova-spiceproxy
nova-volume
python3-nova
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
golang-1.21
golang-1.21-doc
golang-1.21-go
golang-1.21-src
golang-1.22
golang-1.22-doc
golang-1.22-go
golang-1.22-src
openssh-client
openssh-server
openssh-sftp-server
openssh-tests
ssh
ssh-askpass-gnome
python-django-doc
python3-django
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
ghostscript
ghostscript-doc
libgs-common
libgs-dev
libgs10
libgs10-common
gir1.2-gtk-2.0
gtk2-engines-pixbuf
libgail-common
libgail-dev
libgail-doc
libgail18t64
libgtk2.0-0t64
libgtk2.0-bin
libgtk2.0-common
libgtk2.0-dev
libgtk2.0-doc
gir1.2-gtk-3.0
gtk-3-examples
gtk-update-icon-cache
libgail-3-0t64
libgail-3-dev
libgail-3-doc
libgtk-3-0t64
libgtk-3-bin
libgtk-3-common
libgtk-3-dev
libgtk-3-doc
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
python-pymongo-doc
python3-bson
python3-bson-ext
python3-gridfs
python3-pymongo
python3-pymongo-ext
python3-zipp
squid
squid-cgi
squid-common
squid-openssl
squid-purge
squidclient
bind9
bind9-dev
bind9-dnsutils
bind9-doc
bind9-host
bind9-libs
bind9-utils
bind9utils
dnsutils
nova-ajax-console-proxy
nova-api
nova-api-metadata
nova-api-os-compute
nova-api-os-volume
nova-cells
nova-common
nova-compute
nova-compute-ironic
nova-compute-kvm
nova-compute-libvirt
nova-compute-lxc
nova-compute-qemu
nova-compute-vmware
nova-compute-xen
nova-conductor
nova-doc
nova-novncproxy
nova-scheduler
nova-serialproxy
nova-spiceproxy
nova-volume
python3-nova
provd
gir1.2-poppler-0.18
libpoppler-cpp-dev
libpoppler-cpp0t64
libpoppler-dev
libpoppler-glib-dev
libpoppler-glib-doc
libpoppler-glib8t64
libpoppler-private-dev
libpoppler-qt5-1t64
libpoppler-qt5-dev
libpoppler-qt6-3t64
libpoppler-qt6-dev
libpoppler134
poppler-utils
0:
0:
0:
0:
0:
0:
0:
0:
0:
openjdk-8-demo
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jdk-headless
openjdk-8-jre
openjdk-8-jre-headless
openjdk-8-jre-zero
openjdk-8-source
openjdk-11-demo
openjdk-11-doc
openjdk-11-jdk
openjdk-11-jdk-headless
openjdk-11-jre
openjdk-11-jre-headless
openjdk-11-jre-zero
openjdk-11-source
openjdk-17-demo
openjdk-17-doc
openjdk-17-jdk
openjdk-17-jdk-headless
openjdk-17-jre
openjdk-17-jre-headless
openjdk-17-jre-zero
openjdk-17-source
openjdk-21-demo
openjdk-21-doc
openjdk-21-jdk
openjdk-21-jdk-headless
openjdk-21-jre
openjdk-21-jre-headless
openjdk-21-jre-zero
openjdk-21-source
openjdk-21-testsupport
libmysqlclient-dev
libmysqlclient21
mysql-client
mysql-client-8.0
mysql-client-core-8.0
mysql-router
mysql-server
mysql-server-8.0
mysql-server-core-8.0
mysql-source-8.0
mysql-testsuite
mysql-testsuite-8.0
libssl-dev
libssl-doc
libssl3t64
openssl
exim4
exim4-base
exim4-config
exim4-daemon-heavy
exim4-daemon-light
exim4-dev
eximon4
golang-github-snapcore-snapd-dev
golang-github-ubuntu-core-snappy-dev
snap-confine
snapd
snapd-xdg-open
ubuntu-core-launcher
ubuntu-core-snapd-units
ubuntu-snappy
ubuntu-snappy-cli
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
gross
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
eapoltest
hostapd
libwpa-client-dev
wpagui
wpasupplicant
python-django-doc
python3-django
krb5-admin-server
krb5-doc
krb5-gss-samples
krb5-k5tls
krb5-kdc
krb5-kdc-ldap
krb5-kpropd
krb5-locales
krb5-multidev
krb5-otp
krb5-pkinit
krb5-user
libgssapi-krb5-2
libgssrpc4t64
libk5crypto3
libkadm5clnt-mit12
libkadm5srv-mit12
libkdb5-10t64
libkrad-dev
libkrad0
libkrb5-3
libkrb5-dev
libkrb5support0
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
busybox
busybox-initramfs
busybox-static
busybox-syslogd
udhcpc
udhcpd
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
gir1.2-lokdocview-0.1
libjuh-java
libjurt-java
liblibreoffice-java
liblibreofficekitgtk
libofficebean-java
libreoffice
libreoffice-base
libreoffice-base-core
libreoffice-base-drivers
libreoffice-base-nogui
libreoffice-calc
libreoffice-calc-nogui
libreoffice-common
libreoffice-core
libreoffice-core-nogui
libreoffice-dev
libreoffice-dev-common
libreoffice-dev-doc
libreoffice-dev-gui
libreoffice-draw
libreoffice-draw-nogui
libreoffice-evolution
libreoffice-gnome
libreoffice-gtk3
libreoffice-gtk4
libreoffice-help-ca
libreoffice-help-common
libreoffice-help-cs
libreoffice-help-da
libreoffice-help-de
libreoffice-help-dz
libreoffice-help-el
libreoffice-help-en-gb
libreoffice-help-en-us
libreoffice-help-es
libreoffice-help-et
libreoffice-help-eu
libreoffice-help-fi
libreoffice-help-fr
libreoffice-help-gl
libreoffice-help-hi
libreoffice-help-hu
libreoffice-help-id
libreoffice-help-it
libreoffice-help-ja
libreoffice-help-km
libreoffice-help-ko
libreoffice-help-nl
libreoffice-help-om
libreoffice-help-pl
libreoffice-help-pt
libreoffice-help-pt-br
libreoffice-help-ru
libreoffice-help-sk
libreoffice-help-sl
libreoffice-help-sv
libreoffice-help-tr
libreoffice-help-vi
libreoffice-help-zh-cn
libreoffice-help-zh-tw
libreoffice-impress
libreoffice-impress-nogui
libreoffice-java-common
libreoffice-kf5
libreoffice-l10n-af
libreoffice-l10n-am
libreoffice-l10n-ar
libreoffice-l10n-as
libreoffice-l10n-ast
libreoffice-l10n-be
libreoffice-l10n-bg
libreoffice-l10n-bn
libreoffice-l10n-br
libreoffice-l10n-bs
libreoffice-l10n-ca
libreoffice-l10n-cs
libreoffice-l10n-cy
libreoffice-l10n-da
libreoffice-l10n-de
libreoffice-l10n-dz
libreoffice-l10n-el
libreoffice-l10n-en-gb
libreoffice-l10n-en-za
libreoffice-l10n-eo
libreoffice-l10n-es
libreoffice-l10n-et
libreoffice-l10n-eu
libreoffice-l10n-fa
libreoffice-l10n-fi
libreoffice-l10n-fr
libreoffice-l10n-ga
libreoffice-l10n-gd
libreoffice-l10n-gl
libreoffice-l10n-gu
libreoffice-l10n-gug
libreoffice-l10n-he
libreoffice-l10n-hi
libreoffice-l10n-hr
libreoffice-l10n-hu
libreoffice-l10n-hy
libreoffice-l10n-id
libreoffice-l10n-in
libreoffice-l10n-is
libreoffice-l10n-it
libreoffice-l10n-ja
libreoffice-l10n-ka
libreoffice-l10n-kk
libreoffice-l10n-km
libreoffice-l10n-kmr
libreoffice-l10n-kn
libreoffice-l10n-ko
libreoffice-l10n-lt
libreoffice-l10n-lv
libreoffice-l10n-mk
libreoffice-l10n-ml
libreoffice-l10n-mn
libreoffice-l10n-mr
libreoffice-l10n-nb
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-l10n-nn
libreoffice-l10n-nr
libreoffice-l10n-nso
libreoffice-l10n-oc
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pa-in
libreoffice-l10n-pl
libreoffice-l10n-pt
libreoffice-l10n-pt-br
libreoffice-l10n-ro
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-si
libreoffice-l10n-sk
libreoffice-l10n-sl
libreoffice-l10n-sr
libreoffice-l10n-ss
libreoffice-l10n-st
libreoffice-l10n-sv
libreoffice-l10n-szl
libreoffice-l10n-ta
libreoffice-l10n-te
libreoffice-l10n-tg
libreoffice-l10n-th
libreoffice-l10n-tn
libreoffice-l10n-tr
libreoffice-l10n-ts
libreoffice-l10n-ug
libreoffice-l10n-uk
libreoffice-l10n-uz
libreoffice-l10n-ve
libreoffice-l10n-vi
libreoffice-l10n-xh
libreoffice-l10n-za
libreoffice-l10n-zh-cn
libreoffice-l10n-zh-tw
libreoffice-l10n-zu
libreoffice-librelogo
libreoffice-math
libreoffice-math-nogui
libreoffice-nogui
libreoffice-officebean
libreoffice-plasma
libreoffice-qt5
libreoffice-qt6
libreoffice-report-builder
libreoffice-report-builder-bin
libreoffice-report-builder-bin-nogui
libreoffice-script-provider-bsh
libreoffice-script-provider-js
libreoffice-script-provider-python
libreoffice-sdbc-firebird
libreoffice-sdbc-hsqldb
libreoffice-sdbc-mysql
libreoffice-sdbc-postgresql
libreoffice-smoketest-data
libreoffice-style-breeze
libreoffice-style-colibre
libreoffice-style-elementary
libreoffice-style-karasa-jaga
libreoffice-style-sifr
libreoffice-style-sukapura
libreoffice-style-tango
libreoffice-style-yaru
libreoffice-subsequentcheckbase
libreoffice-uiconfig-base
libreoffice-uiconfig-calc
libreoffice-uiconfig-common
libreoffice-uiconfig-draw
libreoffice-uiconfig-impress
libreoffice-uiconfig-math
libreoffice-uiconfig-report-builder
libreoffice-uiconfig-writer
libreoffice-writer
libreoffice-writer-nogui
libreofficekit-data
libreofficekit-dev
libridl-java
libuno-cppu3t64
libuno-cppuhelpergcc3-3t64
libuno-purpenvhelpergcc3-3t64
libuno-sal3t64
libuno-salhelpergcc3-3t64
libunoil-java
libunoloader-java
python3-access2base
python3-scriptforge
python3-uno
uno-libs-private
ure
ure-java
gnome-shell
gnome-shell-common
gnome-shell-extension-prefs
liborc-0.4-0t64
liborc-0.4-dev
liborc-0.4-dev-bin
liborc-0.4-doc
intel-microcode
libecpg-compat3
libecpg-dev
libecpg6
libpgtypes3
libpq-dev
libpq5
postgresql-16
postgresql-client-16
postgresql-doc-16
postgresql-plperl-16
postgresql-plpython3-16
postgresql-pltcl-16
postgresql-server-dev-16
cacti
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
qemu-block-extra
qemu-block-supplemental
qemu-guest-agent
qemu-system
qemu-system-arm
qemu-system-common
qemu-system-data
qemu-system-gui
qemu-system-mips
qemu-system-misc
qemu-system-modules-opengl
qemu-system-modules-spice
qemu-system-ppc
qemu-system-s390x
qemu-system-sparc
qemu-system-x86
qemu-system-x86-xen
qemu-system-xen
qemu-user
qemu-user-binfmt
qemu-user-static
qemu-utils
dovecot-auth-lua
dovecot-core
dovecot-dev
dovecot-gssapi
dovecot-imapd
dovecot-ldap
dovecot-lmtpd
dovecot-managesieved
dovecot-mysql
dovecot-pgsql
dovecot-pop3d
dovecot-sieve
dovecot-solr
dovecot-sqlite
dovecot-submissiond
ffmpeg
ffmpeg-doc
libavcodec-dev
libavcodec-extra
libavcodec-extra60
libavcodec60
libavdevice-dev
libavdevice60
libavfilter-dev
libavfilter-extra
libavfilter-extra9
libavfilter9
libavformat-dev
libavformat-extra
libavformat-extra60
libavformat60
libavutil-dev
libavutil58
libpostproc-dev
libpostproc57
libswresample-dev
libswresample4
libswscale-dev
libswscale7
python-webob-doc
python3-webob
libssl-dev
libssl-doc
libssl3t64
openssl
python-django-doc
python3-django
python3-twisted
twisted-doc
ironic-api
ironic-common
ironic-conductor
python3-ironic
znc-backlog
znc-push
znc
znc-dev
znc-perl
znc-python
znc-tcl
python-aiohttp-doc
python3-aiohttp
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
libtiff-dev
libtiff-doc
libtiff-opengl
libtiff-tools
libtiff5-dev
libtiff6
libtiffxx6
libunbound-dev
libunbound8
python3-unbound
unbound
unbound-anchor
unbound-host
0:
0:
0:
0:
0:
0:
0:
expat
libexpat1
libexpat1-dev
libxmltok1-dev
libxmltok1t64
python-setuptools-doc
python3-pkg-resources
python3-setuptools
python3-setuptools-whl
0:
0:
0:
dcmtk
dcmtk-doc
libdcmtk-dev
libdcmtk17t64
clamav
clamav-base
clamav-daemon
clamav-docs
clamav-freshclam
clamav-milter
clamav-testfiles
clamdscan
libclamav-dev
libclamav11t64
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
libnginx-mod-http-geoip
libnginx-mod-http-image-filter
libnginx-mod-http-perl
libnginx-mod-http-xslt-filter
libnginx-mod-mail
libnginx-mod-stream
libnginx-mod-stream-geoip
nginx
nginx-common
nginx-core
nginx-dev
nginx-doc
nginx-extras
nginx-full
nginx-light
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
frr
frr-doc
frr-pythontools
frr-rpki-rtrlib
frr-snmp
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
emacs
emacs-bin-common
emacs-common
emacs-el
emacs-gtk
emacs-lucid
emacs-nox
emacs-pgtk
puma
libtomcat9-java
intel-microcode
libopenjp2-7
libopenjp2-7-dev
libopenjp2-tools
libopenjpip-dec-server
libopenjpip-server
libopenjpip-viewer
libopenjpip7
openjpeg-doc
libapr1-dev
libapr1t64
cups
cups-bsd
cups-client
cups-common
cups-core-drivers
cups-daemon
cups-ipp-utils
cups-ppdc
cups-server-common
libcups2-dev
libcups2t64
libcupsimage2-dev
libcupsimage2t64
cups-browsed
cups-browsed-tests
cups-browsed
cups-browsed-tests
libcupsfilters-dev
libcupsfilters-tests
libcupsfilters2-common
libcupsfilters2t64
libppd-dev
libppd-tests
libppd-utils
libppd2
libppd2-common
ppdc
bubblewrap
flatpak
flatpak-tests
gir1.2-flatpak-1.0
libflatpak-dev
libflatpak-doc
libflatpak0
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
libapache2-mod-php8.3
libphp8.3-embed
php8.3
php8.3-bcmath
php8.3-bz2
php8.3-cgi
php8.3-cli
php8.3-common
php8.3-curl
php8.3-dba
php8.3-dev
php8.3-enchant
php8.3-fpm
php8.3-gd
php8.3-gmp
php8.3-imap
php8.3-interbase
php8.3-intl
php8.3-ldap
php8.3-mbstring
php8.3-mysql
php8.3-odbc
php8.3-opcache
php8.3-pgsql
php8.3-phpdbg
php8.3-pspell
php8.3-readline
php8.3-snmp
php8.3-soap
php8.3-sqlite3
php8.3-sybase
php8.3-tidy
php8.3-xml
php8.3-xsl
php8.3-zip
python-asyncssh-doc
python3-asyncssh
unzip
freeradius
freeradius-common
freeradius-config
freeradius-dhcp
freeradius-iodbc
freeradius-krb5
freeradius-ldap
freeradius-memcached
freeradius-mysql
freeradius-postgresql
freeradius-python3
freeradius-redis
freeradius-rest
freeradius-utils
freeradius-yubikey
libfreeradius-dev
libfreeradius3
ruby-webrick
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
liboath-dev
liboath0t64
libpam-oath
libpskc-dev
libpskc0t64
oathtool
pskctool
gir1.2-gsf-1
libgsf-1-114
libgsf-1-common
libgsf-1-dev
libgsf-bin
ubuntu-advantage-desktop-daemon
nano
nano-tiny
libarchive-dev
libarchive-tools
libarchive13t64
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
amd64-microcode
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
libunbound-dev
libunbound8
python3-unbound
unbound
unbound-anchor
unbound-host
golang-1.22
golang-1.22-doc
golang-1.22-go
golang-1.22-src
heif-gdk-pixbuf
heif-thumbnailer
libheif-dev
libheif-examples
libheif-plugin-aomdec
libheif-plugin-aomenc
libheif-plugin-dav1d
libheif-plugin-ffmpegdec
libheif-plugin-j2kdec
libheif-plugin-j2kenc
libheif-plugin-jpegdec
libheif-plugin-jpegenc
libheif-plugin-libde265
libheif-plugin-rav1e
libheif-plugin-svtenc
libheif-plugin-x265
libheif1
libopenjp2-7
libopenjp2-7-dev
libopenjp2-tools
libopenjpip-dec-server
libopenjpip-server
libopenjpip-viewer
libopenjpip7
openjpeg-doc
python3-urllib3
python3-pip
python3-pip-whl
xnest
xorg-server-source
xserver-common
xserver-xephyr
xserver-xorg-core
xserver-xorg-dev
xserver-xorg-legacy
xvfb
xwayland
libarchive-dev
libarchive-tools
libarchive13t64
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libruby3.2
ruby3.2
ruby3.2-dev
ruby3.2-doc
libmpg123-0t64
libmpg123-dev
libout123-0t64
libsyn123-0t64
mpg123
python-werkzeug-doc
python3-werkzeug
qemu-block-extra
qemu-block-supplemental
qemu-guest-agent
qemu-system
qemu-system-arm
qemu-system-common
qemu-system-data
qemu-system-gui
qemu-system-mips
qemu-system-misc
qemu-system-modules-opengl
qemu-system-modules-spice
qemu-system-ppc
qemu-system-s390x
qemu-system-sparc
qemu-system-x86
qemu-system-x86-xen
qemu-system-xen
qemu-user
qemu-user-binfmt
qemu-user-static
qemu-utils
0:
0:
openjdk-8-demo
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jdk-headless
openjdk-8-jre
openjdk-8-jre-headless
openjdk-8-jre-zero
openjdk-8-source
openjdk-8-demo
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jdk-headless
openjdk-8-jre
openjdk-8-jre-headless
openjdk-8-jre-zero
openjdk-8-source
openjdk-11-demo
openjdk-11-doc
openjdk-11-jdk
openjdk-11-jdk-headless
openjdk-11-jre
openjdk-11-jre-headless
openjdk-11-jre-zero
openjdk-11-source
openjdk-17-demo
openjdk-17-doc
openjdk-17-jdk
openjdk-17-jdk-headless
openjdk-17-jre
openjdk-17-jre-headless
openjdk-17-jre-zero
openjdk-17-source
openjdk-21-demo
openjdk-21-doc
openjdk-21-jdk
openjdk-21-jdk-headless
openjdk-21-jre
openjdk-21-jre-headless
openjdk-21-jre-zero
openjdk-21-source
openjdk-21-testsupport
libmysqlclient-dev
libmysqlclient21
mysql-client
mysql-client-8.0
mysql-client-core-8.0
mysql-router
mysql-server
mysql-server-8.0
mysql-server-core-8.0
mysql-source-8.0
mysql-testsuite
mysql-testsuite-8.0
ghostscript
ghostscript-doc
libgs-common
libgs-dev
libgs10
libgs10-common
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
python-asyncssh-doc
python3-asyncssh
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
gir1.2-girepository-3.0
gir1.2-girepository-3.0-dev
gir1.2-glib-2.0
gir1.2-glib-2.0-dev
libgirepository-2.0-0
libgirepository-2.0-dev
libglib2.0-0t64
libglib2.0-bin
libglib2.0-data
libglib2.0-dev
libglib2.0-dev-bin
libglib2.0-doc
libglib2.0-tests
python-waitress-doc
python3-waitress
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
libmodule-scandeps-perl
needrestart
needrestart
needrestart
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
rapidjson-dev
rapidjson-doc
gir1.2-soup-2.4
libsoup-2.4-1
libsoup-gnome-2.4-1
libsoup-gnome2.4-dev
libsoup2.4-common
libsoup2.4-dev
libsoup2.4-doc
libsoup2.4-tests
gir1.2-soup-3.0
libsoup-3.0-0
libsoup-3.0-common
libsoup-3.0-dev
libsoup-3.0-doc
libsoup-3.0-tests
gh
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
libecpg-compat3
libecpg-dev
libecpg6
libpgtypes3
libpq-dev
libpq5
postgresql-16
postgresql-client-16
postgresql-doc-16
postgresql-plperl-16
postgresql-plpython3-16
postgresql-pltcl-16
postgresql-server-dev-16
haproxy
haproxy-doc
vim-haproxy
python-django-doc
python3-django
ofono
ofono-dev
ofono-scripts
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
expat
libexpat1
libexpat1-dev
libshiro-java
intel-microcode
python-tornado-doc
python3-tornado
ofono
ofono-dev
ofono-scripts
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libapache2-mod-php8.3
libphp8.3-embed
php8.3
php8.3-bcmath
php8.3-bz2
php8.3-cgi
php8.3-cli
php8.3-common
php8.3-curl
php8.3-dba
php8.3-dev
php8.3-enchant
php8.3-fpm
php8.3-gd
php8.3-gmp
php8.3-imap
php8.3-interbase
php8.3-intl
php8.3-ldap
php8.3-mbstring
php8.3-mysql
php8.3-odbc
php8.3-opcache
php8.3-pgsql
php8.3-phpdbg
php8.3-pspell
php8.3-readline
php8.3-snmp
php8.3-soap
php8.3-sqlite3
php8.3-sybase
php8.3-tidy
php8.3-xml
php8.3-xsl
php8.3-zip
smarty3
docker-doc
docker.io
golang-github-docker-docker-dev
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
libspring-aop-java
libspring-beans-java
libspring-context-java
libspring-context-support-java
libspring-core-java
libspring-expression-java
libspring-instrument-java
libspring-jdbc-java
libspring-jms-java
libspring-messaging-java
libspring-orm-java
libspring-oxm-java
libspring-test-java
libspring-transaction-java
libspring-web-java
libspring-web-portlet-java
libspring-web-servlet-java
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
gir1.2-gstreamer-1.0
gstreamer1.0-tools
libgstreamer1.0-0
libgstreamer1.0-dev
gir1.2-gst-plugins-base-1.0
gstreamer1.0-alsa
gstreamer1.0-gl
gstreamer1.0-plugins-base
gstreamer1.0-plugins-base-apps
gstreamer1.0-x
libgstreamer-gl1.0-0
libgstreamer-plugins-base1.0-0
libgstreamer-plugins-base1.0-dev
gstreamer1.0-gtk3
gstreamer1.0-plugins-good
gstreamer1.0-pulseaudio
gstreamer1.0-qt5
gstreamer1.0-qt6
libgstreamer-plugins-good1.0-0
libgstreamer-plugins-good1.0-dev
dpdk
dpdk-dev
dpdk-doc
libdpdk-dev
librte-acl24
librte-baseband-acc24
librte-baseband-fpga-5gnr-fec24
librte-baseband-fpga-lte-fec24
librte-baseband-la12xx24
librte-baseband-null24
librte-baseband-turbo-sw24
librte-bbdev24
librte-bitratestats24
librte-bpf24
librte-bus-auxiliary24
librte-bus-cdx24
librte-bus-dpaa24
librte-bus-fslmc24
librte-bus-ifpga24
librte-bus-pci24
librte-bus-platform24
librte-bus-vdev24
librte-bus-vmbus24
librte-cfgfile24
librte-cmdline24
librte-common-cnxk24
librte-common-cpt24
librte-common-dpaax24
librte-common-iavf24
librte-common-idpf24
librte-common-mlx5-24
librte-common-nfp24
librte-common-octeontx24
librte-common-qat24
librte-common-sfc-efx24
librte-compress-isal24
librte-compress-mlx5-24
librte-compress-octeontx24
librte-compress-zlib24
librte-compressdev24
librte-crypto-bcmfs24
librte-crypto-caam-jr24
librte-crypto-ccp24
librte-crypto-cnxk24
librte-crypto-dpaa-sec24
librte-crypto-dpaa2-sec24
librte-crypto-ipsec-mb24
librte-crypto-mlx5-24
librte-crypto-nitrox24
librte-crypto-null24
librte-crypto-octeontx24
librte-crypto-openssl24
librte-crypto-scheduler24
librte-crypto-virtio24
librte-cryptodev24
librte-dispatcher24
librte-distributor24
librte-dma-cnxk24
librte-dma-dpaa2-24
librte-dma-dpaa24
librte-dma-hisilicon24
librte-dma-idxd24
librte-dma-ioat24
librte-dma-skeleton24
librte-dmadev24
librte-eal24
librte-efd24
librte-ethdev24
librte-event-cnxk24
librte-event-dlb2-24
librte-event-dpaa2-24
librte-event-dpaa24
librte-event-dsw24
librte-event-octeontx24
librte-event-opdl24
librte-event-skeleton24
librte-event-sw24
librte-eventdev24
librte-fib24
librte-gpudev24
librte-graph24
librte-gro24
librte-gso24
librte-hash24
librte-ip-frag24
librte-ipsec24
librte-jobstats24
librte-kvargs24
librte-latencystats24
librte-log24
librte-lpm24
librte-mbuf24
librte-member24
librte-mempool-bucket24
librte-mempool-cnxk24
librte-mempool-dpaa2-24
librte-mempool-dpaa24
librte-mempool-octeontx24
librte-mempool-ring24
librte-mempool-stack24
librte-mempool24
librte-meta-all
librte-meta-allpmds
librte-meta-baseband
librte-meta-bus
librte-meta-common
librte-meta-compress
librte-meta-crypto
librte-meta-dma
librte-meta-event
librte-meta-mempool
librte-meta-net
librte-meta-raw
librte-meter24
librte-metrics24
librte-ml-cnxk24
librte-mldev24
librte-net-af-packet24
librte-net-af-xdp24
librte-net-ark24
librte-net-atlantic24
librte-net-avp24
librte-net-axgbe24
librte-net-bnx2x24
librte-net-bnxt24
librte-net-bond24
librte-net-cnxk24
librte-net-cpfl24
librte-net-cxgbe24
librte-net-dpaa2-24
librte-net-dpaa24
librte-net-e1000-24
librte-net-ena24
librte-net-enetc24
librte-net-enetfec24
librte-net-enic24
librte-net-failsafe24
librte-net-fm10k24
librte-net-gve24
librte-net-hinic24
librte-net-hns3-24
librte-net-i40e24
librte-net-iavf24
librte-net-ice24
librte-net-idpf24
librte-net-igc24
librte-net-ionic24
librte-net-ipn3ke24
librte-net-ixgbe24
librte-net-mana24
librte-net-memif24
librte-net-mlx4-24
librte-net-mlx5-24
librte-net-netvsc24
librte-net-nfp24
librte-net-ngbe24
librte-net-null24
librte-net-octeon-ep24
librte-net-octeontx24
librte-net-pcap24
librte-net-pfe24
librte-net-qede24
librte-net-ring24
librte-net-sfc24
librte-net-softnic24
librte-net-tap24
librte-net-thunderx24
librte-net-txgbe24
librte-net-vdev-netvsc24
librte-net-vhost24
librte-net-virtio24
librte-net-vmxnet3-24
librte-net24
librte-node24
librte-pcapng24
librte-pci24
librte-pdcp24
librte-pdump24
librte-pipeline24
librte-port24
librte-power24
librte-raw-cnxk-bphy24
librte-raw-cnxk-gpio24
librte-raw-dpaa2-cmdif24
librte-raw-ifpga24
librte-raw-ntb24
librte-raw-skeleton24
librte-rawdev24
librte-rcu24
librte-regex-cn9k24
librte-regex-mlx5-24
librte-regexdev24
librte-reorder24
librte-rib24
librte-ring24
librte-sched24
librte-security24
librte-stack24
librte-table24
librte-telemetry24
librte-timer24
librte-vdpa-ifc24
librte-vdpa-mlx5-24
librte-vdpa-nfp24
librte-vdpa-sfc24
librte-vhost24
ceph
ceph-base
ceph-common
ceph-fuse
ceph-grafana-dashboards
ceph-immutable-object-cache
ceph-mds
ceph-mgr
ceph-mgr-cephadm
ceph-mgr-dashboard
ceph-mgr-diskprediction-local
ceph-mgr-k8sevents
ceph-mgr-modules-core
ceph-mgr-rook
ceph-mon
ceph-osd
ceph-prometheus-alerts
ceph-resource-agents
ceph-volume
cephadm
cephfs-mirror
cephfs-shell
crimson-osd
libcephfs-dev
libcephfs-java
libcephfs-jni
libcephfs2
librados-dev
librados2
libradospp-dev
libradosstriper-dev
libradosstriper1
librbd-dev
librbd1
librgw-dev
librgw2
libsqlite3-mod-ceph
libsqlite3-mod-ceph-dev
python3-ceph
python3-ceph-argparse
python3-ceph-common
python3-cephfs
python3-rados
python3-rbd
python3-rgw
rados-objclass-dev
radosgw
rbd-fuse
rbd-mirror
rbd-nbd
0:
tinyproxy
tinyproxy-bin
xfpt
0:
adsys
adsys-windows
golang-golang-x-net-dev
libxmltok1-dev
libxmltok1t64
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
neomutt
python-django-doc
python3-django
rsync
rsync
git
git-all
git-cvs
git-daemon-run
git-daemon-sysvinit
git-doc
git-email
git-gui
git-man
git-mediawiki
git-svn
gitk
gitweb
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
gir1.2-poppler-0.18
libpoppler-cpp-dev
libpoppler-cpp0t64
libpoppler-dev
libpoppler-glib-dev
libpoppler-glib-doc
libpoppler-glib8t64
libpoppler-private-dev
libpoppler-qt5-1t64
libpoppler-qt5-dev
libpoppler-qt6-3t64
libpoppler-qt6-dev
libpoppler134
poppler-utils
python3-tqdm
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
0:
libopenjp2-7
libopenjp2-7-dev
libopenjp2-tools
libopenjpip-dec-server
libopenjpip-server
libopenjpip-viewer
libopenjpip7
openjpeg-doc
cyrus-admin
cyrus-caldav
cyrus-clients
cyrus-common
cyrus-dev
cyrus-doc
cyrus-imapd
cyrus-murder
cyrus-nntpd
cyrus-pop3d
cyrus-replication
libcyrus-imap-perl
htmldoc
htmldoc-common
libpcl-apps1.14
libpcl-common1.14
libpcl-dev
libpcl-doc
libpcl-features1.14
libpcl-filters1.14
libpcl-io1.14
libpcl-kdtree1.14
libpcl-keypoints1.14
libpcl-ml1.14
libpcl-octree1.14
libpcl-outofcore1.14
libpcl-people1.14
libpcl-recognition1.14
libpcl-registration1.14
libpcl-sample-consensus1.14
libpcl-search1.14
libpcl-segmentation1.14
libpcl-stereo1.14
libpcl-surface1.14
libpcl-tracking1.14
libpcl-visualization1.14
pcl-tools
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
gir1.2-lokdocview-0.1
libjuh-java
libjurt-java
liblibreoffice-java
liblibreofficekitgtk
libofficebean-java
libreoffice
libreoffice-base
libreoffice-base-core
libreoffice-base-drivers
libreoffice-base-nogui
libreoffice-calc
libreoffice-calc-nogui
libreoffice-common
libreoffice-core
libreoffice-core-nogui
libreoffice-dev
libreoffice-dev-common
libreoffice-dev-doc
libreoffice-dev-gui
libreoffice-draw
libreoffice-draw-nogui
libreoffice-evolution
libreoffice-gnome
libreoffice-gtk3
libreoffice-gtk4
libreoffice-help-ca
libreoffice-help-common
libreoffice-help-cs
libreoffice-help-da
libreoffice-help-de
libreoffice-help-dz
libreoffice-help-el
libreoffice-help-en-gb
libreoffice-help-en-us
libreoffice-help-es
libreoffice-help-et
libreoffice-help-eu
libreoffice-help-fi
libreoffice-help-fr
libreoffice-help-gl
libreoffice-help-hi
libreoffice-help-hu
libreoffice-help-id
libreoffice-help-it
libreoffice-help-ja
libreoffice-help-km
libreoffice-help-ko
libreoffice-help-nl
libreoffice-help-om
libreoffice-help-pl
libreoffice-help-pt
libreoffice-help-pt-br
libreoffice-help-ru
libreoffice-help-sk
libreoffice-help-sl
libreoffice-help-sv
libreoffice-help-tr
libreoffice-help-vi
libreoffice-help-zh-cn
libreoffice-help-zh-tw
libreoffice-impress
libreoffice-impress-nogui
libreoffice-java-common
libreoffice-kf5
libreoffice-l10n-af
libreoffice-l10n-am
libreoffice-l10n-ar
libreoffice-l10n-as
libreoffice-l10n-ast
libreoffice-l10n-be
libreoffice-l10n-bg
libreoffice-l10n-bn
libreoffice-l10n-br
libreoffice-l10n-bs
libreoffice-l10n-ca
libreoffice-l10n-cs
libreoffice-l10n-cy
libreoffice-l10n-da
libreoffice-l10n-de
libreoffice-l10n-dz
libreoffice-l10n-el
libreoffice-l10n-en-gb
libreoffice-l10n-en-za
libreoffice-l10n-eo
libreoffice-l10n-es
libreoffice-l10n-et
libreoffice-l10n-eu
libreoffice-l10n-fa
libreoffice-l10n-fi
libreoffice-l10n-fr
libreoffice-l10n-ga
libreoffice-l10n-gd
libreoffice-l10n-gl
libreoffice-l10n-gu
libreoffice-l10n-gug
libreoffice-l10n-he
libreoffice-l10n-hi
libreoffice-l10n-hr
libreoffice-l10n-hu
libreoffice-l10n-hy
libreoffice-l10n-id
libreoffice-l10n-in
libreoffice-l10n-is
libreoffice-l10n-it
libreoffice-l10n-ja
libreoffice-l10n-ka
libreoffice-l10n-kk
libreoffice-l10n-km
libreoffice-l10n-kmr
libreoffice-l10n-kn
libreoffice-l10n-ko
libreoffice-l10n-lt
libreoffice-l10n-lv
libreoffice-l10n-mk
libreoffice-l10n-ml
libreoffice-l10n-mn
libreoffice-l10n-mr
libreoffice-l10n-nb
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-l10n-nn
libreoffice-l10n-nr
libreoffice-l10n-nso
libreoffice-l10n-oc
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pa-in
libreoffice-l10n-pl
libreoffice-l10n-pt
libreoffice-l10n-pt-br
libreoffice-l10n-ro
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-si
libreoffice-l10n-sk
libreoffice-l10n-sl
libreoffice-l10n-sr
libreoffice-l10n-ss
libreoffice-l10n-st
libreoffice-l10n-sv
libreoffice-l10n-szl
libreoffice-l10n-ta
libreoffice-l10n-te
libreoffice-l10n-tg
libreoffice-l10n-th
libreoffice-l10n-tn
libreoffice-l10n-tr
libreoffice-l10n-ts
libreoffice-l10n-ug
libreoffice-l10n-uk
libreoffice-l10n-uz
libreoffice-l10n-ve
libreoffice-l10n-vi
libreoffice-l10n-xh
libreoffice-l10n-za
libreoffice-l10n-zh-cn
libreoffice-l10n-zh-tw
libreoffice-l10n-zu
libreoffice-librelogo
libreoffice-math
libreoffice-math-nogui
libreoffice-nogui
libreoffice-officebean
libreoffice-plasma
libreoffice-qt5
libreoffice-qt6
libreoffice-report-builder
libreoffice-report-builder-bin
libreoffice-report-builder-bin-nogui
libreoffice-script-provider-bsh
libreoffice-script-provider-js
libreoffice-script-provider-python
libreoffice-sdbc-firebird
libreoffice-sdbc-hsqldb
libreoffice-sdbc-mysql
libreoffice-sdbc-postgresql
libreoffice-smoketest-data
libreoffice-style-breeze
libreoffice-style-colibre
libreoffice-style-elementary
libreoffice-style-karasa-jaga
libreoffice-style-sifr
libreoffice-style-sukapura
libreoffice-style-tango
libreoffice-style-yaru
libreoffice-subsequentcheckbase
libreoffice-uiconfig-base
libreoffice-uiconfig-calc
libreoffice-uiconfig-common
libreoffice-uiconfig-draw
libreoffice-uiconfig-impress
libreoffice-uiconfig-math
libreoffice-uiconfig-report-builder
libreoffice-uiconfig-writer
libreoffice-writer
libreoffice-writer-nogui
libreofficekit-data
libreofficekit-dev
libridl-java
libuno-cppu3t64
libuno-cppuhelpergcc3-3t64
libuno-purpenvhelpergcc3-3t64
libuno-sal3t64
libuno-salhelpergcc3-3t64
libunoil-java
libunoloader-java
python3-access2base
python3-scriptforge
python3-uno
uno-libs-private
ure
ure-java
clamav
clamav-base
clamav-daemon
clamav-docs
clamav-freshclam
clamav-milter
clamav-testfiles
clamdscan
libclamav-dev
libclamav11t64
frr
frr-doc
frr-pythontools
frr-rpki-rtrlib
frr-snmp
tcpreplay
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libxml2
libxml2-dev
libxml2-doc
libxml2-utils
python3-libxml2
bind9
bind9-dev
bind9-dnsutils
bind9-doc
bind9-host
bind9-libs
bind9-utils
bind9utils
dnsutils
libvlc-bin
libvlc-dev
libvlc5
libvlccore-dev
libvlccore9
vlc
vlc-bin
vlc-data
vlc-l10n
vlc-plugin-access-extra
vlc-plugin-base
vlc-plugin-fluidsynth
vlc-plugin-jack
vlc-plugin-notify
vlc-plugin-qt
vlc-plugin-samba
vlc-plugin-skins2
vlc-plugin-svg
vlc-plugin-video-output
vlc-plugin-video-splitter
vlc-plugin-visualization
python-jinja2-doc
python3-jinja2
libmysqlclient-dev
libmysqlclient21
mysql-client
mysql-client-8.0
mysql-client-core-8.0
mysql-router
mysql-server
mysql-server-8.0
mysql-server-core-8.0
mysql-source-8.0
mysql-testsuite
mysql-testsuite-8.0
openjdk-11-demo
openjdk-11-doc
openjdk-11-jdk
openjdk-11-jdk-headless
openjdk-11-jre
openjdk-11-jre-headless
openjdk-11-jre-zero
openjdk-11-source
openjdk-17-demo
openjdk-17-doc
openjdk-17-jdk
openjdk-17-jdk-headless
openjdk-17-jre
openjdk-17-jre-headless
openjdk-17-jre-zero
openjdk-17-source
openjdk-21-demo
openjdk-21-doc
openjdk-21-jdk
openjdk-21-jdk-headless
openjdk-21-jre
openjdk-21-jre-headless
openjdk-21-jre-zero
openjdk-21-source
openjdk-21-testsupport
krb5-admin-server
krb5-doc
krb5-gss-samples
krb5-k5tls
krb5-kdc
krb5-kdc-ldap
krb5-kpropd
krb5-locales
krb5-multidev
krb5-otp
krb5-pkinit
krb5-user
libgssapi-krb5-2
libgssrpc4t64
libk5crypto3
libkadm5clnt-mit12
libkadm5srv-mit12
libkdb5-10t64
libkrad-dev
libkrad0
libkrb5-3
libkrb5-dev
libkrb5support0
ckeditor
glibc-doc
glibc-source
libc-bin
libc-dev-bin
libc-devtools
libc6
libc6-amd64
libc6-dev
libc6-dev-amd64
libc6-dev-i386
libc6-dev-s390
libc6-dev-x32
libc6-i386
libc6-s390
libc6-x32
locales
locales-all
nscd
openrefine
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
libsndfile1
libsndfile1-dev
sndfile-programs
intel-microcode
openssh-client
openssh-server
openssh-sftp-server
openssh-tests
ssh
ssh-askpass-gnome
python3-virtualenv
virtualenv
php-symfony
php-symfony-all-my-sms-notifier
php-symfony-amazon-mailer
php-symfony-amazon-sns-notifier
php-symfony-amazon-sqs-messenger
php-symfony-amqp-messenger
php-symfony-asset
php-symfony-asset-mapper
php-symfony-bandwidth-notifier
php-symfony-beanstalkd-messenger
php-symfony-brevo-mailer
php-symfony-brevo-notifier
php-symfony-browser-kit
php-symfony-cache
php-symfony-chatwork-notifier
php-symfony-click-send-notifier
php-symfony-clickatell-notifier
php-symfony-clock
php-symfony-config
php-symfony-console
php-symfony-contact-everyone-notifier
php-symfony-crowdin-translation-provider
php-symfony-css-selector
php-symfony-debug-bundle
php-symfony-dependency-injection
php-symfony-discord-notifier
php-symfony-doctrine-bridge
php-symfony-doctrine-messenger
php-symfony-dom-crawler
php-symfony-dotenv
php-symfony-engagespot-notifier
php-symfony-error-handler
php-symfony-esendex-notifier
php-symfony-event-dispatcher
php-symfony-expo-notifier
php-symfony-expression-language
php-symfony-fake-chat-notifier
php-symfony-fake-sms-notifier
php-symfony-filesystem
php-symfony-finder
php-symfony-firebase-notifier
php-symfony-form
php-symfony-forty-six-elks-notifier
php-symfony-framework-bundle
php-symfony-free-mobile-notifier
php-symfony-gateway-api-notifier
php-symfony-gitter-notifier
php-symfony-go-ip-notifier
php-symfony-google-chat-notifier
php-symfony-google-mailer
php-symfony-html-sanitizer
php-symfony-http-client
php-symfony-http-foundation
php-symfony-http-kernel
php-symfony-infobip-mailer
php-symfony-infobip-notifier
php-symfony-intl
php-symfony-iqsms-notifier
php-symfony-isendpro-notifier
php-symfony-kaz-info-teh-notifier
php-symfony-ldap
php-symfony-light-sms-notifier
php-symfony-line-notify-notifier
php-symfony-linked-in-notifier
php-symfony-lock
php-symfony-loco-translation-provider
php-symfony-lokalise-translation-provider
php-symfony-mail-pace-mailer
php-symfony-mailchimp-mailer
php-symfony-mailer
php-symfony-mailer-send-mailer
php-symfony-mailgun-mailer
php-symfony-mailjet-mailer
php-symfony-mailjet-notifier
php-symfony-mastodon-notifier
php-symfony-mattermost-notifier
php-symfony-mercure-notifier
php-symfony-message-bird-notifier
php-symfony-message-media-notifier
php-symfony-messenger
php-symfony-microsoft-teams-notifier
php-symfony-mime
php-symfony-mobyt-notifier
php-symfony-monolog-bridge
php-symfony-notifier
php-symfony-novu-notifier
php-symfony-ntfy-notifier
php-symfony-octopush-notifier
php-symfony-oh-my-smtp-mailer
php-symfony-one-signal-notifier
php-symfony-options-resolver
php-symfony-orange-sms-notifier
php-symfony-ovh-cloud-notifier
php-symfony-pager-duty-notifier
php-symfony-password-hasher
php-symfony-phpunit-bridge
php-symfony-phrase-translation-provider
php-symfony-plivo-notifier
php-symfony-postmark-mailer
php-symfony-process
php-symfony-property-access
php-symfony-property-info
php-symfony-proxy-manager-bridge
php-symfony-psr-http-message-bridge
php-symfony-pushover-notifier
php-symfony-rate-limiter
php-symfony-redis-messenger
php-symfony-redlink-notifier
php-symfony-remote-event
php-symfony-ring-central-notifier
php-symfony-rocket-chat-notifier
php-symfony-routing
php-symfony-runtime
php-symfony-scaleway-mailer
php-symfony-scheduler
php-symfony-security-bundle
php-symfony-security-core
php-symfony-security-csrf
php-symfony-security-http
php-symfony-semaphore
php-symfony-sendberry-notifier
php-symfony-sendgrid-mailer
php-symfony-sendinblue-mailer
php-symfony-sendinblue-notifier
php-symfony-serializer
php-symfony-simple-textin-notifier
php-symfony-sinch-notifier
php-symfony-slack-notifier
php-symfony-sms-biuras-notifier
php-symfony-sms-factor-notifier
php-symfony-sms77-notifier
php-symfony-smsapi-notifier
php-symfony-smsc-notifier
php-symfony-smsmode-notifier
php-symfony-spot-hit-notifier
php-symfony-stopwatch
php-symfony-string
php-symfony-telegram-notifier
php-symfony-telnyx-notifier
php-symfony-templating
php-symfony-termii-notifier
php-symfony-translation
php-symfony-turbo-sms-notifier
php-symfony-twig-bridge
php-symfony-twig-bundle
php-symfony-twilio-notifier
php-symfony-twitter-notifier
php-symfony-uid
php-symfony-validator
php-symfony-var-dumper
php-symfony-var-exporter
php-symfony-vonage-notifier
php-symfony-web-link
php-symfony-web-profiler-bundle
php-symfony-webhook
php-symfony-workflow
php-symfony-yaml
php-symfony-yunpian-notifier
php-symfony-zendesk-notifier
php-symfony-zulip-notifier
libtasn1-6
libtasn1-6-dev
libtasn1-bin
libtasn1-doc
libssl-dev
libssl-doc
libssl3t64
openssl
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
gnutls-bin
gnutls-doc
libgnutls-dane0t64
libgnutls-openssl27t64
libgnutls28-dev
libgnutls30t64
libnetty-java
libnginx-mod-http-geoip
libnginx-mod-http-image-filter
libnginx-mod-http-perl
libnginx-mod-http-xslt-filter
libnginx-mod-mail
libnginx-mod-stream
libnginx-mod-stream-geoip
nginx
nginx-common
nginx-core
nginx-dev
nginx-doc
nginx-extras
nginx-full
nginx-light
libiniparser-dev
libiniparser-doc
libiniparser1
libcap-dev
libcap2
libcap2-bin
libpam-cap
proftpd-core
proftpd-dev
proftpd-doc
proftpd-mod-crypto
proftpd-mod-geoip
proftpd-mod-ldap
proftpd-mod-mysql
proftpd-mod-odbc
proftpd-mod-pgsql
proftpd-mod-snmp
proftpd-mod-sqlite
proftpd-mod-wrap
xnest
xorg-server-source
xserver-common
xserver-xephyr
xserver-xorg-core
xserver-xorg-dev
xserver-xorg-legacy
xvfb
xwayland
0:
0:
libxml2
libxml2-dev
libxml2-doc
libxml2-utils
python3-libxml2
0:
0:
0:
0:
0:
0:
0:
binutils
binutils-aarch64-linux-gnu
binutils-alpha-linux-gnu
binutils-arc-linux-gnu
binutils-arm-linux-gnueabi
binutils-arm-linux-gnueabihf
binutils-common
binutils-dev
binutils-doc
binutils-for-build
binutils-for-host
binutils-hppa-linux-gnu
binutils-hppa64-linux-gnu
binutils-i686-gnu
binutils-i686-kfreebsd-gnu
binutils-i686-linux-gnu
binutils-ia64-linux-gnu
binutils-loongarch64-linux-gnu
binutils-m68k-linux-gnu
binutils-multiarch
binutils-multiarch-dev
binutils-powerpc-linux-gnu
binutils-powerpc64-linux-gnu
binutils-powerpc64le-linux-gnu
binutils-riscv64-linux-gnu
binutils-s390x-linux-gnu
binutils-sh4-linux-gnu
binutils-source
binutils-sparc64-linux-gnu
binutils-x86-64-gnu
binutils-x86-64-kfreebsd-gnu
binutils-x86-64-linux-gnu
binutils-x86-64-linux-gnux32
libbinutils
libctf-nobfd0
libctf0
libgprofng0
libsframe1
libxmltok1-dev
libxmltok1t64
ruby-saml
0:
0:
opennds
opennds-daemon
opennds-daemon-common
erlang
erlang-asn1
erlang-base
erlang-common-test
erlang-crypto
erlang-debugger
erlang-dev
erlang-dialyzer
erlang-diameter
erlang-doc
erlang-edoc
erlang-eldap
erlang-erl-docgen
erlang-et
erlang-eunit
erlang-examples
erlang-ftp
erlang-inets
erlang-jinterface
erlang-manpages
erlang-megaco
erlang-mnesia
erlang-mode
erlang-nox
erlang-observer
erlang-odbc
erlang-os-mon
erlang-parsetools
erlang-public-key
erlang-reltool
erlang-runtime-tools
erlang-snmp
erlang-src
erlang-ssh
erlang-ssl
erlang-syntax-tools
erlang-tftp
erlang-tools
erlang-wx
erlang-x11
erlang-xmerl
krb5-admin-server
krb5-doc
krb5-gss-samples
krb5-k5tls
krb5-kdc
krb5-kdc-ldap
krb5-kpropd
krb5-locales
krb5-multidev
krb5-otp
krb5-pkinit
krb5-user
libgssapi-krb5-2
libgssrpc4t64
libk5crypto3
libkadm5clnt-mit12
libkadm5srv-mit12
libkdb5-10t64
libkrad-dev
libkrad0
libkrb5-3
libkrb5-dev
libkrb5support0
libecpg-compat3
libecpg-dev
libecpg6
libpgtypes3
libpq-dev
libpq5
postgresql-16
postgresql-client-16
postgresql-doc-16
postgresql-plperl-16
postgresql-plpython3-16
postgresql-pltcl-16
postgresql-server-dev-16
libraptor2-0
libraptor2-dev
libraptor2-doc
raptor2-utils
eapoltest
hostapd
libwpa-client-dev
wpagui
wpasupplicant
cmark-gfm
libcmark-gfm-dev
libcmark-gfm-extensions-dev
libcmark-gfm-extensions0.29.0.gfm.6
libcmark-gfm0.29.0.gfm.6
gpac
gpac-modules-base
libgpac-dev
libgpac12t64
redis
redis-sentinel
redis-server
redis-tools
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
python-django-doc
python3-django
gnuchess
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
gir1.2-lokdocview-0.1
libjuh-java
libjurt-java
liblibreoffice-java
liblibreofficekitgtk
libofficebean-java
libreoffice
libreoffice-base
libreoffice-base-core
libreoffice-base-drivers
libreoffice-base-nogui
libreoffice-calc
libreoffice-calc-nogui
libreoffice-common
libreoffice-core
libreoffice-core-nogui
libreoffice-dev
libreoffice-dev-common
libreoffice-dev-doc
libreoffice-dev-gui
libreoffice-draw
libreoffice-draw-nogui
libreoffice-evolution
libreoffice-gnome
libreoffice-gtk3
libreoffice-gtk4
libreoffice-help-ca
libreoffice-help-common
libreoffice-help-cs
libreoffice-help-da
libreoffice-help-de
libreoffice-help-dz
libreoffice-help-el
libreoffice-help-en-gb
libreoffice-help-en-us
libreoffice-help-es
libreoffice-help-et
libreoffice-help-eu
libreoffice-help-fi
libreoffice-help-fr
libreoffice-help-gl
libreoffice-help-hi
libreoffice-help-hu
libreoffice-help-id
libreoffice-help-it
libreoffice-help-ja
libreoffice-help-km
libreoffice-help-ko
libreoffice-help-nl
libreoffice-help-om
libreoffice-help-pl
libreoffice-help-pt
libreoffice-help-pt-br
libreoffice-help-ru
libreoffice-help-sk
libreoffice-help-sl
libreoffice-help-sv
libreoffice-help-tr
libreoffice-help-vi
libreoffice-help-zh-cn
libreoffice-help-zh-tw
libreoffice-impress
libreoffice-impress-nogui
libreoffice-java-common
libreoffice-kf5
libreoffice-l10n-af
libreoffice-l10n-am
libreoffice-l10n-ar
libreoffice-l10n-as
libreoffice-l10n-ast
libreoffice-l10n-be
libreoffice-l10n-bg
libreoffice-l10n-bn
libreoffice-l10n-br
libreoffice-l10n-bs
libreoffice-l10n-ca
libreoffice-l10n-cs
libreoffice-l10n-cy
libreoffice-l10n-da
libreoffice-l10n-de
libreoffice-l10n-dz
libreoffice-l10n-el
libreoffice-l10n-en-gb
libreoffice-l10n-en-za
libreoffice-l10n-eo
libreoffice-l10n-es
libreoffice-l10n-et
libreoffice-l10n-eu
libreoffice-l10n-fa
libreoffice-l10n-fi
libreoffice-l10n-fr
libreoffice-l10n-ga
libreoffice-l10n-gd
libreoffice-l10n-gl
libreoffice-l10n-gu
libreoffice-l10n-gug
libreoffice-l10n-he
libreoffice-l10n-hi
libreoffice-l10n-hr
libreoffice-l10n-hu
libreoffice-l10n-hy
libreoffice-l10n-id
libreoffice-l10n-in
libreoffice-l10n-is
libreoffice-l10n-it
libreoffice-l10n-ja
libreoffice-l10n-ka
libreoffice-l10n-kk
libreoffice-l10n-km
libreoffice-l10n-kmr
libreoffice-l10n-kn
libreoffice-l10n-ko
libreoffice-l10n-lt
libreoffice-l10n-lv
libreoffice-l10n-mk
libreoffice-l10n-ml
libreoffice-l10n-mn
libreoffice-l10n-mr
libreoffice-l10n-nb
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-l10n-nn
libreoffice-l10n-nr
libreoffice-l10n-nso
libreoffice-l10n-oc
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pa-in
libreoffice-l10n-pl
libreoffice-l10n-pt
libreoffice-l10n-pt-br
libreoffice-l10n-ro
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-si
libreoffice-l10n-sk
libreoffice-l10n-sl
libreoffice-l10n-sr
libreoffice-l10n-ss
libreoffice-l10n-st
libreoffice-l10n-sv
libreoffice-l10n-szl
libreoffice-l10n-ta
libreoffice-l10n-te
libreoffice-l10n-tg
libreoffice-l10n-th
libreoffice-l10n-tn
libreoffice-l10n-tr
libreoffice-l10n-ts
libreoffice-l10n-ug
libreoffice-l10n-uk
libreoffice-l10n-uz
libreoffice-l10n-ve
libreoffice-l10n-vi
libreoffice-l10n-xh
libreoffice-l10n-za
libreoffice-l10n-zh-cn
libreoffice-l10n-zh-tw
libreoffice-l10n-zu
libreoffice-librelogo
libreoffice-math
libreoffice-math-nogui
libreoffice-nogui
libreoffice-officebean
libreoffice-plasma
libreoffice-qt5
libreoffice-qt6
libreoffice-report-builder
libreoffice-report-builder-bin
libreoffice-report-builder-bin-nogui
libreoffice-script-provider-bsh
libreoffice-script-provider-js
libreoffice-script-provider-python
libreoffice-sdbc-firebird
libreoffice-sdbc-hsqldb
libreoffice-sdbc-mysql
libreoffice-sdbc-postgresql
libreoffice-smoketest-data
libreoffice-style-breeze
libreoffice-style-colibre
libreoffice-style-elementary
libreoffice-style-karasa-jaga
libreoffice-style-sifr
libreoffice-style-sukapura
libreoffice-style-tango
libreoffice-style-yaru
libreoffice-subsequentcheckbase
libreoffice-uiconfig-base
libreoffice-uiconfig-calc
libreoffice-uiconfig-common
libreoffice-uiconfig-draw
libreoffice-uiconfig-impress
libreoffice-uiconfig-math
libreoffice-uiconfig-report-builder
libreoffice-uiconfig-writer
libreoffice-writer
libreoffice-writer-nogui
libreofficekit-data
libreofficekit-dev
libridl-java
libuno-cppu3t64
libuno-cppuhelpergcc3-3t64
libuno-purpenvhelpergcc3-3t64
libuno-sal3t64
libuno-salhelpergcc3-3t64
libunoil-java
libunoloader-java
python3-access2base
python3-scriptforge
python3-uno
uno-libs-private
ure
ure-java
freerdp2-dev
freerdp2-shadow-x11
freerdp2-wayland
freerdp2-x11
libfreerdp-client2-2t64
libfreerdp-server2-2t64
libfreerdp-shadow-subsystem2-2t64
libfreerdp-shadow2-2t64
libfreerdp2-2t64
libuwac0-0t64
libuwac0-dev
libwinpr-tools2-2t64
libwinpr2-2t64
libwinpr2-dev
winpr-utils
python-jinja2-doc
python3-jinja2
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
opensc
opensc-pkcs11
netatalk
libresteasy-java
plantuml
python3-djoser
python3-restrictedpython
liburiparser-dev
liburiparser-doc
liburiparser1
libxslt1-dev
libxslt1.1
xsltproc
valkey-redis-compat
valkey-sentinel
valkey-server
valkey-tools
libxslt1-dev
libxslt1.1
xsltproc
golang-github-cli-go-gh-v2-dev
libpam-pkcs11
libsaml-dev
libsaml-doc
libsaml12t64
opensaml-schemas
opensaml-tools
ruby-rack
libzvbi-common
libzvbi-dev
libzvbi-doc
libzvbi0t64
zvbi
debuginfod
elfutils
libasm-dev
libasm1t64
libdebuginfod-common
libdebuginfod-dev
libdebuginfod1t64
libdw-dev
libdw1t64
libelf-dev
libelf1t64
smartdns
freerdp2-dev
freerdp2-shadow-x11
freerdp2-wayland
freerdp2-x11
libfreerdp-client2-2t64
libfreerdp-server2-2t64
libfreerdp-shadow-subsystem2-2t64
libfreerdp-shadow2-2t64
libfreerdp2-2t64
libuwac0-0t64
libuwac0-dev
libwinpr-tools2-2t64
libwinpr2-2t64
libwinpr2-dev
winpr-utils
exim4
exim4-base
exim4-config
exim4-daemon-heavy
exim4-daemon-light
exim4-dev
eximon4
golang-github-containerd-containerd-dev
containerd
elpa-org
org-mode
libmariadb-dev
libmariadb-dev-compat
libmariadb3
libmariadbd-dev
libmariadbd19t64
mariadb-backup
mariadb-client
mariadb-client-core
mariadb-common
mariadb-plugin-connect
mariadb-plugin-cracklib-password-check
mariadb-plugin-gssapi-client
mariadb-plugin-gssapi-server
mariadb-plugin-hashicorp-key-management
mariadb-plugin-mroonga
mariadb-plugin-oqgraph
mariadb-plugin-provider-bzip2
mariadb-plugin-provider-lz4
mariadb-plugin-provider-lzma
mariadb-plugin-provider-lzo
mariadb-plugin-provider-snappy
mariadb-plugin-rocksdb
mariadb-plugin-s3
mariadb-plugin-spider
mariadb-server
mariadb-server-10.5
mariadb-server-core
mariadb-test
mariadb-test-data
smarty4
ghostscript
ghostscript-doc
libgs-common
libgs-dev
libgs10
libgs10-common
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
ovn-central
ovn-common
ovn-controller-vtep
ovn-doc
ovn-docker
ovn-host
ovn-ic
ovn-ic-db
libtar-dev
libtar0t64
rabbitmq-server
libapache2-mod-php8.3
libphp8.3-embed
php8.3
php8.3-bcmath
php8.3-bz2
php8.3-cgi
php8.3-cli
php8.3-common
php8.3-curl
php8.3-dba
php8.3-dev
php8.3-enchant
php8.3-fpm
php8.3-gd
php8.3-gmp
php8.3-imap
php8.3-interbase
php8.3-intl
php8.3-ldap
php8.3-mbstring
php8.3-mysql
php8.3-odbc
php8.3-opcache
php8.3-pgsql
php8.3-phpdbg
php8.3-pspell
php8.3-readline
php8.3-snmp
php8.3-soap
php8.3-sqlite3
php8.3-sybase
php8.3-tidy
php8.3-xml
php8.3-xsl
php8.3-zip
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
ruby-saml
openvpn
dirmngr
gnupg
gnupg-agent
gnupg-l10n
gnupg-utils
gnupg2
gpg
gpg-agent
gpg-wks-client
gpg-wks-server
gpgconf
gpgsm
gpgv
gpgv-static
gpgv-win32
keyboxd
scdaemon
liblzma-dev
liblzma-doc
liblzma5
xz-utils
xzdec
libruby3.2
ruby3.2
ruby3.2-dev
ruby3.2-doc
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
binutils
binutils-aarch64-linux-gnu
binutils-alpha-linux-gnu
binutils-arc-linux-gnu
binutils-arm-linux-gnueabi
binutils-arm-linux-gnueabihf
binutils-common
binutils-dev
binutils-doc
binutils-for-build
binutils-for-host
binutils-hppa-linux-gnu
binutils-hppa64-linux-gnu
binutils-i686-gnu
binutils-i686-kfreebsd-gnu
binutils-i686-linux-gnu
binutils-ia64-linux-gnu
binutils-loongarch64-linux-gnu
binutils-m68k-linux-gnu
binutils-multiarch
binutils-multiarch-dev
binutils-powerpc-linux-gnu
binutils-powerpc64-linux-gnu
binutils-powerpc64le-linux-gnu
binutils-riscv64-linux-gnu
binutils-s390x-linux-gnu
binutils-sh4-linux-gnu
binutils-source
binutils-sparc64-linux-gnu
binutils-x86-64-gnu
binutils-x86-64-kfreebsd-gnu
binutils-x86-64-linux-gnu
binutils-x86-64-linux-gnux32
libbinutils
libctf-nobfd0
libctf0
libgprofng0
libsframe1
expat
libexpat1
libexpat1-dev
erlang
erlang-asn1
erlang-base
erlang-common-test
erlang-crypto
erlang-debugger
erlang-dev
erlang-dialyzer
erlang-diameter
erlang-doc
erlang-edoc
erlang-eldap
erlang-erl-docgen
erlang-et
erlang-eunit
erlang-examples
erlang-ftp
erlang-inets
erlang-jinterface
erlang-manpages
erlang-megaco
erlang-mnesia
erlang-mode
erlang-nox
erlang-observer
erlang-odbc
erlang-os-mon
erlang-parsetools
erlang-public-key
erlang-reltool
erlang-runtime-tools
erlang-snmp
erlang-src
erlang-ssh
erlang-ssl
erlang-syntax-tools
erlang-tftp
erlang-tools
erlang-wx
erlang-x11
erlang-xmerl
gir1.2-poppler-0.18
libpoppler-cpp-dev
libpoppler-cpp0t64
libpoppler-dev
libpoppler-glib-dev
libpoppler-glib-doc
libpoppler-glib8t64
libpoppler-private-dev
libpoppler-qt5-1t64
libpoppler-qt5-dev
libpoppler-qt6-3t64
libpoppler-qt6-dev
libpoppler134
poppler-utils
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
haproxy
haproxy-doc
vim-haproxy
gir1.2-soup-2.4
libsoup-2.4-1
libsoup-gnome-2.4-1
libsoup-gnome2.4-dev
libsoup2.4-common
libsoup2.4-dev
libsoup2.4-doc
libsoup2.4-tests
gir1.2-soup-3.0
libsoup-3.0-0
libsoup-3.0-common
libsoup-3.0-dev
libsoup-3.0-doc
libsoup-3.0-tests
graphicsmagick
graphicsmagick-imagemagick-compat
graphicsmagick-libmagick-dev-compat
libgraphics-magick-perl
libgraphicsmagick++-q16-12t64
libgraphicsmagick++1-dev
libgraphicsmagick-q16-3t64
libgraphicsmagick1-dev
libperl-dev
libperl5.38t64
perl
perl-base
perl-debug
perl-doc
perl-modules-5.38
elpa-protobuf-mode
libprotobuf-dev
libprotobuf-java
libprotobuf-lite32t64
libprotobuf32t64
libprotoc-dev
libprotoc32t64
php-google-protobuf
protobuf-compiler
python3-protobuf
ruby-google-protobuf
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
cimg-dev
cimg-doc
cimg-examples
7zip
7zip-standalone
libquickjs
quickjs
libmosquitto-dev
libmosquitto1
libmosquittopp-dev
libmosquittopp1
mosquitto
mosquitto-clients
mosquitto-dev
erlang
erlang-asn1
erlang-base
erlang-common-test
erlang-crypto
erlang-debugger
erlang-dev
erlang-dialyzer
erlang-diameter
erlang-doc
erlang-edoc
erlang-eldap
erlang-erl-docgen
erlang-et
erlang-eunit
erlang-examples
erlang-ftp
erlang-inets
erlang-jinterface
erlang-manpages
erlang-megaco
erlang-mnesia
erlang-mode
erlang-nox
erlang-observer
erlang-odbc
erlang-os-mon
erlang-parsetools
erlang-public-key
erlang-reltool
erlang-runtime-tools
erlang-snmp
erlang-src
erlang-ssh
erlang-ssl
erlang-syntax-tools
erlang-tftp
erlang-tools
erlang-wx
erlang-x11
erlang-xmerl
0:
0:
0:
libapache2-mod-auth-openidc
yelp-xsl
libyelp-dev
libyelp0
yelp
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libarchive-dev
libarchive-tools
libarchive13t64
php-twig
php-twig-cache-extra
php-twig-cssinliner-extra
php-twig-doc
php-twig-extra-bundle
php-twig-html-extra
php-twig-inky-extra
php-twig-intl-extra
php-twig-markdown-extra
php-twig-string-extra
openssh-client
openssh-server
openssh-sftp-server
openssh-tests
ssh
ssh-askpass-gnome
jupyter-notebook
python-notebook-doc
python3-notebook
libxml2
libxml2-dev
libxml2-doc
libxml2-utils
python3-libxml2
0:
gir1.2-poppler-0.18
libpoppler-cpp-dev
libpoppler-cpp0t64
libpoppler-dev
libpoppler-glib-dev
libpoppler-glib-doc
libpoppler-glib8t64
libpoppler-private-dev
libpoppler-qt5-1t64
libpoppler-qt5-dev
libpoppler-qt6-3t64
libpoppler-qt6-dev
libpoppler134
poppler-utils
micropython
micropython-doc
ghostscript
ghostscript-doc
libgs-common
libgs-dev
libgs10
libgs10-common
golang-github-docker-docker-dev
python-scrapy-doc
python3-scrapy
corosync
corosync-doc
corosync-notifyd
corosync-vqsim
libcfg-dev
libcfg7
libcmap-dev
libcmap4
libcorosync-common-dev
libcorosync-common4
libcpg-dev
libcpg4
libquorum-dev
libquorum5
libsam-dev
libsam4
libvotequorum-dev
libvotequorum8
libmysqlclient-dev
libmysqlclient21
mysql-client
mysql-client-8.0
mysql-client-core-8.0
mysql-router
mysql-server
mysql-server-8.0
mysql-server-core-8.0
mysql-source-8.0
mysql-testsuite
mysql-testsuite-8.0
openjdk-8-demo
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jdk-headless
openjdk-8-jre
openjdk-8-jre-headless
openjdk-8-jre-zero
openjdk-8-source
openjdk-11-demo
openjdk-11-doc
openjdk-11-jdk
openjdk-11-jdk-headless
openjdk-11-jre
openjdk-11-jre-headless
openjdk-11-jre-zero
openjdk-11-source
openjdk-17-demo
openjdk-17-doc
openjdk-17-jdk
openjdk-17-jdk-headless
openjdk-17-jre
openjdk-17-jre-headless
openjdk-17-jre-zero
openjdk-17-source
openjdk-21-demo
openjdk-21-doc
openjdk-21-jdk
openjdk-21-jdk-headless
openjdk-21-jre
openjdk-21-jre-headless
openjdk-21-jre-zero
openjdk-21-source
openjdk-21-testsupport
libraw-bin
libraw-dev
libraw-doc
libraw23t64
libfcgi-bin
libfcgi-dev
libfcgi0t64
0:
0:
0:
gir1.2-soup-2.4
libsoup-2.4-1
libsoup-gnome-2.4-1
libsoup-gnome2.4-dev
libsoup2.4-common
libsoup2.4-dev
libsoup2.4-doc
libsoup2.4-tests
gir1.2-soup-2.4
libsoup-2.4-1
libsoup-gnome-2.4-1
libsoup-gnome2.4-dev
libsoup2.4-common
libsoup2.4-dev
libsoup2.4-doc
libsoup2.4-tests
gir1.2-soup-3.0
libsoup-3.0-0
libsoup-3.0-common
libsoup-3.0-dev
libsoup-3.0-doc
libsoup-3.0-tests
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
ruby-carrierwave
0:
0:
python-django-doc
python3-django
python3-h11
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
gir1.2-lokdocview-0.1
libjuh-java
libjurt-java
liblibreoffice-java
liblibreofficekitgtk
libofficebean-java
libreoffice
libreoffice-base
libreoffice-base-core
libreoffice-base-drivers
libreoffice-base-nogui
libreoffice-calc
libreoffice-calc-nogui
libreoffice-common
libreoffice-core
libreoffice-core-nogui
libreoffice-dev
libreoffice-dev-common
libreoffice-dev-doc
libreoffice-dev-gui
libreoffice-draw
libreoffice-draw-nogui
libreoffice-evolution
libreoffice-gnome
libreoffice-gtk3
libreoffice-gtk4
libreoffice-help-ca
libreoffice-help-common
libreoffice-help-cs
libreoffice-help-da
libreoffice-help-de
libreoffice-help-dz
libreoffice-help-el
libreoffice-help-en-gb
libreoffice-help-en-us
libreoffice-help-es
libreoffice-help-et
libreoffice-help-eu
libreoffice-help-fi
libreoffice-help-fr
libreoffice-help-gl
libreoffice-help-hi
libreoffice-help-hu
libreoffice-help-id
libreoffice-help-it
libreoffice-help-ja
libreoffice-help-km
libreoffice-help-ko
libreoffice-help-nl
libreoffice-help-om
libreoffice-help-pl
libreoffice-help-pt
libreoffice-help-pt-br
libreoffice-help-ru
libreoffice-help-sk
libreoffice-help-sl
libreoffice-help-sv
libreoffice-help-tr
libreoffice-help-vi
libreoffice-help-zh-cn
libreoffice-help-zh-tw
libreoffice-impress
libreoffice-impress-nogui
libreoffice-java-common
libreoffice-kf5
libreoffice-l10n-af
libreoffice-l10n-am
libreoffice-l10n-ar
libreoffice-l10n-as
libreoffice-l10n-ast
libreoffice-l10n-be
libreoffice-l10n-bg
libreoffice-l10n-bn
libreoffice-l10n-br
libreoffice-l10n-bs
libreoffice-l10n-ca
libreoffice-l10n-cs
libreoffice-l10n-cy
libreoffice-l10n-da
libreoffice-l10n-de
libreoffice-l10n-dz
libreoffice-l10n-el
libreoffice-l10n-en-gb
libreoffice-l10n-en-za
libreoffice-l10n-eo
libreoffice-l10n-es
libreoffice-l10n-et
libreoffice-l10n-eu
libreoffice-l10n-fa
libreoffice-l10n-fi
libreoffice-l10n-fr
libreoffice-l10n-ga
libreoffice-l10n-gd
libreoffice-l10n-gl
libreoffice-l10n-gu
libreoffice-l10n-gug
libreoffice-l10n-he
libreoffice-l10n-hi
libreoffice-l10n-hr
libreoffice-l10n-hu
libreoffice-l10n-hy
libreoffice-l10n-id
libreoffice-l10n-in
libreoffice-l10n-is
libreoffice-l10n-it
libreoffice-l10n-ja
libreoffice-l10n-ka
libreoffice-l10n-kk
libreoffice-l10n-km
libreoffice-l10n-kmr
libreoffice-l10n-kn
libreoffice-l10n-ko
libreoffice-l10n-lt
libreoffice-l10n-lv
libreoffice-l10n-mk
libreoffice-l10n-ml
libreoffice-l10n-mn
libreoffice-l10n-mr
libreoffice-l10n-nb
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-l10n-nn
libreoffice-l10n-nr
libreoffice-l10n-nso
libreoffice-l10n-oc
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pa-in
libreoffice-l10n-pl
libreoffice-l10n-pt
libreoffice-l10n-pt-br
libreoffice-l10n-ro
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-si
libreoffice-l10n-sk
libreoffice-l10n-sl
libreoffice-l10n-sr
libreoffice-l10n-ss
libreoffice-l10n-st
libreoffice-l10n-sv
libreoffice-l10n-szl
libreoffice-l10n-ta
libreoffice-l10n-te
libreoffice-l10n-tg
libreoffice-l10n-th
libreoffice-l10n-tn
libreoffice-l10n-tr
libreoffice-l10n-ts
libreoffice-l10n-ug
libreoffice-l10n-uk
libreoffice-l10n-uz
libreoffice-l10n-ve
libreoffice-l10n-vi
libreoffice-l10n-xh
libreoffice-l10n-za
libreoffice-l10n-zh-cn
libreoffice-l10n-zh-tw
libreoffice-l10n-zu
libreoffice-librelogo
libreoffice-math
libreoffice-math-nogui
libreoffice-nogui
libreoffice-officebean
libreoffice-plasma
libreoffice-qt5
libreoffice-qt6
libreoffice-report-builder
libreoffice-report-builder-bin
libreoffice-report-builder-bin-nogui
libreoffice-script-provider-bsh
libreoffice-script-provider-js
libreoffice-script-provider-python
libreoffice-sdbc-firebird
libreoffice-sdbc-hsqldb
libreoffice-sdbc-mysql
libreoffice-sdbc-postgresql
libreoffice-smoketest-data
libreoffice-style-breeze
libreoffice-style-colibre
libreoffice-style-elementary
libreoffice-style-karasa-jaga
libreoffice-style-sifr
libreoffice-style-sukapura
libreoffice-style-tango
libreoffice-style-yaru
libreoffice-subsequentcheckbase
libreoffice-uiconfig-base
libreoffice-uiconfig-calc
libreoffice-uiconfig-common
libreoffice-uiconfig-draw
libreoffice-uiconfig-impress
libreoffice-uiconfig-math
libreoffice-uiconfig-report-builder
libreoffice-uiconfig-writer
libreoffice-writer
libreoffice-writer-nogui
libreofficekit-data
libreofficekit-dev
libridl-java
libuno-cppu3t64
libuno-cppuhelpergcc3-3t64
libuno-purpenvhelpergcc3-3t64
libuno-sal3t64
libuno-salhelpergcc3-3t64
libunoil-java
libunoloader-java
python3-access2base
python3-scriptforge
python3-uno
uno-libs-private
ure
ure-java
libabsl-dev
libabsl20220623t64
ruby-rack
open-vm-tools
open-vm-tools-containerinfo
open-vm-tools-desktop
open-vm-tools-dev
open-vm-tools-salt-minion
open-vm-tools-sdmp
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libecpg-compat3
libecpg-dev
libecpg6
libpgtypes3
libpq-dev
libpq5
postgresql-16
postgresql-client-16
postgresql-doc-16
postgresql-plperl-16
postgresql-plpython3-16
postgresql-pltcl-16
postgresql-server-dev-16
0:
0:
0:
0:
0:
0:
0:
libtomcat10-embed-java
libtomcat10-java
tomcat10
tomcat10-admin
tomcat10-common
tomcat10-docs
tomcat10-examples
tomcat10-user
libtomcat9-java
lemon
libsqlite3-0
libsqlite3-dev
libsqlite3-tcl
sqlite3
sqlite3-doc
sqlite3-tools
gir1.2-girepository-3.0
gir1.2-girepository-3.0-dev
gir1.2-glib-2.0
gir1.2-glib-2.0-dev
libgirepository-2.0-0
libgirepository-2.0-dev
libglib2.0-0t64
libglib2.0-bin
libglib2.0-data
libglib2.0-dev
libglib2.0-dev-bin
libglib2.0-doc
libglib2.0-tests
intel-microcode
cifs-utils
net-tools
net-tools
ffmpeg
ffmpeg-doc
libavcodec-dev
libavcodec-extra
libavcodec-extra60
libavcodec60
libavdevice-dev
libavdevice60
libavfilter-dev
libavfilter-extra
libavfilter-extra9
libavfilter9
libavformat-dev
libavformat-extra
libavformat-extra60
libavformat60
libavutil-dev
libavutil58
libpostproc-dev
libpostproc57
libswresample-dev
libswresample4
libswscale-dev
libswscale7
krb5-admin-server
krb5-doc
krb5-gss-samples
krb5-k5tls
krb5-kdc
krb5-kdc-ldap
krb5-kpropd
krb5-locales
krb5-multidev
krb5-otp
krb5-pkinit
krb5-user
libgssapi-krb5-2
libgssrpc4t64
libk5crypto3
libkadm5clnt-mit12
libkadm5srv-mit12
libkdb5-10t64
libkrad-dev
libkrad0
libkrb5-3
libkrb5-dev
libkrb5support0
gir1.2-soup-2.4
libsoup-2.4-1
libsoup-gnome-2.4-1
libsoup-gnome2.4-dev
libsoup2.4-common
libsoup2.4-dev
libsoup2.4-doc
libsoup2.4-tests
gir1.2-soup-3.0
libsoup-3.0-0
libsoup-3.0-common
libsoup-3.0-dev
libsoup-3.0-doc
libsoup-3.0-tests
python-setuptools-doc
python3-pkg-resources
python3-setuptools
python3-setuptools-whl
apport
apport-core-dump-handler
apport-gtk
apport-kde
apport-noui
apport-retrace
apport-valgrind
dh-apport
python3-apport
python3-problem-report
apport
apport-core-dump-handler
apport-gtk
apport-kde
apport-noui
apport-retrace
apport-valgrind
dh-apport
python3-apport
python3-problem-report
python-tornado-doc
python3-tornado
libmariadb-dev
libmariadb-dev-compat
libmariadb3
libmariadbd-dev
libmariadbd19t64
mariadb-backup
mariadb-client
mariadb-client-core
mariadb-common
mariadb-plugin-connect
mariadb-plugin-cracklib-password-check
mariadb-plugin-gssapi-client
mariadb-plugin-gssapi-server
mariadb-plugin-hashicorp-key-management
mariadb-plugin-mroonga
mariadb-plugin-oqgraph
mariadb-plugin-provider-bzip2
mariadb-plugin-provider-lz4
mariadb-plugin-provider-lzma
mariadb-plugin-provider-lzo
mariadb-plugin-provider-snappy
mariadb-plugin-rocksdb
mariadb-plugin-s3
mariadb-plugin-spider
mariadb-server
mariadb-server-10.5
mariadb-server-core
mariadb-test
mariadb-test-data
php-twig
php-twig-cache-extra
php-twig-cssinliner-extra
php-twig-doc
php-twig-extra-bundle
php-twig-html-extra
php-twig-inky-extra
php-twig-intl-extra
php-twig-markdown-extra
php-twig-string-extra
libvpx-dev
libvpx-doc
libvpx9
vpx-tools
python-django-doc
python3-django
fonts-glyphicons-halflings
libjs-bootstrap
libjs-bootstrap4
gir1.2-gst-plugins-bad-1.0
gstreamer1.0-opencv
gstreamer1.0-plugins-bad
gstreamer1.0-plugins-bad-apps
libgstreamer-opencv1.0-0
libgstreamer-plugins-bad1.0-0
libgstreamer-plugins-bad1.0-dev
libnss-myhostname
libnss-mymachines
libnss-resolve
libnss-systemd
libpam-systemd
libsystemd-dev
libsystemd-shared
libsystemd0
libudev-dev
libudev1
systemd
systemd-boot
systemd-boot-efi
systemd-container
systemd-coredump
systemd-dev
systemd-homed
systemd-journal-remote
systemd-oomd
systemd-resolved
systemd-standalone-sysusers
systemd-standalone-tmpfiles
systemd-sysv
systemd-tests
systemd-timesyncd
systemd-ukify
systemd-userdbd
udev
amd64-microcode
libtomcat10-embed-java
libtomcat10-java
tomcat10
tomcat10-admin
tomcat10-common
tomcat10-docs
tomcat10-examples
tomcat10-user
libtomcat9-java
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_oracle_(\d+)