Canonical USN OVAL Generator 1 5.11.1 2025-06-12T11:10:27 Copyright (C) 2025 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/. Check that Ubuntu 24.04 LTS (noble) is installed. USN-6663-3 -- OpenSSL update Ubuntu 24.04 LTS USN-6663-1 provided a security update for OpenSSL. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl3t64 - 3.0.13-0ubuntu3.1 libssl-dev - 3.0.13-0ubuntu3.1 openssl - 3.0.13-0ubuntu3.1 libssl-doc - 3.0.13-0ubuntu3.1 No subscription required None https://launchpad.net/bugs/2054090 USN-6673-3 -- python-cryptography vulnerability Ubuntu 24.04 LTS USN-6673-1 provided a security update for python-cryptography. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-cryptography - 41.0.7-4ubuntu0.1 python-cryptography-doc - 41.0.7-4ubuntu0.1 No subscription required Medium CVE-2024-26130 USN-6715-2 -- unixODBC vulnerability Ubuntu 24.04 LTS USN-6715-1 fixed a vulnerability in unixODBC. This update provides the corresponding fix for Ubuntu 24.04 LTS. Original advisory details: It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.24.04.1 unixodbc-dev - 2.3.12-1ubuntu0.24.04.1 unixodbc-common - 2.3.12-1ubuntu0.24.04.1 unixodbc - 2.3.12-1ubuntu0.24.04.1 odbcinst - 2.3.12-1ubuntu0.24.04.1 libodbcinst2 - 2.3.12-1ubuntu0.24.04.1 libodbccr2 - 2.3.12-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-1013 USN-6718-3 -- curl vulnerabilities Ubuntu 24.04 LTS USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 8.5.0-2ubuntu10.1 libcurl4-openssl-dev - 8.5.0-2ubuntu10.1 libcurl3t64-gnutls - 8.5.0-2ubuntu10.1 libcurl4-doc - 8.5.0-2ubuntu10.1 curl - 8.5.0-2ubuntu10.1 libcurl4t64 - 8.5.0-2ubuntu10.1 No subscription required Medium CVE-2024-2004 CVE-2024-2398 USN-6729-3 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2-data - 2.4.58-1ubuntu8.1 libapache2-mod-md - 2.4.58-1ubuntu8.1 apache2-utils - 2.4.58-1ubuntu8.1 apache2-dev - 2.4.58-1ubuntu8.1 apache2-suexec-pristine - 2.4.58-1ubuntu8.1 apache2-suexec-custom - 2.4.58-1ubuntu8.1 apache2 - 2.4.58-1ubuntu8.1 apache2-doc - 2.4.58-1ubuntu8.1 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.1 apache2-ssl-dev - 2.4.58-1ubuntu8.1 apache2-bin - 2.4.58-1ubuntu8.1 No subscription required Medium CVE-2023-38709 CVE-2024-24795 CVE-2024-27316 USN-6733-2 -- GnuTLS vulnerabilities Ubuntu 24.04 LTS USN-6733-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.1 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.1 libgnutls28-dev - 3.8.3-1.1ubuntu3.1 gnutls-doc - 3.8.3-1.1ubuntu3.1 libgnutls30t64 - 3.8.3-1.1ubuntu3.1 gnutls-bin - 3.8.3-1.1ubuntu3.1 No subscription required Medium CVE-2024-28834 CVE-2024-28835 USN-6734-2 -- libvirt vulnerabilities Ubuntu 24.04 LTS USN-6734-1 fixed vulnerabilities in libvirt. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) Update Instructions: Run `sudo pro fix USN-6734-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.1 libvirt-dev - 10.0.0-2ubuntu8.1 libvirt-wireshark - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.1 libvirt-login-shell - 10.0.0-2ubuntu8.1 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.1 libnss-libvirt - 10.0.0-2ubuntu8.1 libvirt-daemon - 10.0.0-2ubuntu8.1 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.1 libvirt-daemon-config-network - 10.0.0-2ubuntu8.1 libvirt-l10n - 10.0.0-2ubuntu8.1 libvirt-clients - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.1 libvirt-daemon-system - 10.0.0-2ubuntu8.1 libvirt0 - 10.0.0-2ubuntu8.1 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.1 libvirt-sanlock - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.1 libvirt-doc - 10.0.0-2ubuntu8.1 No subscription required Medium CVE-2024-1441 CVE-2024-2494 USN-6736-2 -- klibc vulnerabilities Ubuntu 24.04 LTS USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-4ubuntu0.1 libklibc - 2.0.13-4ubuntu0.1 libklibc-dev - 2.0.13-4ubuntu0.1 No subscription required Medium CVE-2016-9840 CVE-2016-9841 CVE-2018-25032 CVE-2022-37434 USN-6737-2 -- GNU C Library vulnerability Ubuntu 24.04 LTS USN-6737-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.1 glibc-doc - 2.39-0ubuntu8.1 locales-all - 2.39-0ubuntu8.1 libc6-i386 - 2.39-0ubuntu8.1 libc6-s390 - 2.39-0ubuntu8.1 libc6-dev-i386 - 2.39-0ubuntu8.1 libc6-dev-s390 - 2.39-0ubuntu8.1 libc6-dev - 2.39-0ubuntu8.1 libc6-amd64 - 2.39-0ubuntu8.1 libc6-x32 - 2.39-0ubuntu8.1 libc6-dev-amd64 - 2.39-0ubuntu8.1 libc-dev-bin - 2.39-0ubuntu8.1 libc6 - 2.39-0ubuntu8.1 nscd - 2.39-0ubuntu8.1 libc-devtools - 2.39-0ubuntu8.1 glibc-source - 2.39-0ubuntu8.1 libc6-dev-x32 - 2.39-0ubuntu8.1 locales - 2.39-0ubuntu8.1 No subscription required Medium CVE-2024-2961 USN-6744-3 -- Pillow vulnerability Ubuntu 24.04 LTS USN-6744-1 fixed a vulnerability in Pillow. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pil.imagetk - 10.2.0-1ubuntu1 python-pil-doc - 10.2.0-1ubuntu1 python3-pil - 10.2.0-1ubuntu1 No subscription required Medium CVE-2024-28219 USN-6746-2 -- Google Guest Agent and Google OS Config Agent vulnerability Ubuntu 24.04 LTS USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google OS Config Agent. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-guest-agent - 20240213.00-0ubuntu3.1 No subscription required google-osconfig-agent - 20240320.00-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-24786 USN-6754-2 -- nghttp2 vulnerability Ubuntu 24.04 LTS USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.59.0-1ubuntu0.1 libnghttp2-doc - 1.59.0-1ubuntu0.1 libnghttp2-dev - 1.59.0-1ubuntu0.1 nghttp2-proxy - 1.59.0-1ubuntu0.1 nghttp2 - 1.59.0-1ubuntu0.1 nghttp2-client - 1.59.0-1ubuntu0.1 nghttp2-server - 1.59.0-1ubuntu0.1 No subscription required Medium CVE-2024-28182 USN-6756-1 -- less vulnerability Ubuntu 24.04 LTS It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu2.1 No subscription required Medium CVE-2024-32487 USN-6759-1 -- FreeRDP vulnerabilities Ubuntu 24.04 LTS It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6759-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwinpr3-dev - 3.5.1+dfsg1-0ubuntu1 libfreerdp-server3-3 - 3.5.1+dfsg1-0ubuntu1 winpr3-utils - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-dev - 3.5.1+dfsg1-0ubuntu1 freerdp3-shadow-x11 - 3.5.1+dfsg1-0ubuntu1 libfreerdp3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-client3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-wayland - 3.5.1+dfsg1-0ubuntu1 libwinpr-tools3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow-subsystem3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-x11 - 3.5.1+dfsg1-0ubuntu1 libwinpr3-3 - 3.5.1+dfsg1-0ubuntu1 No subscription required Medium CVE-2024-32658 CVE-2024-32659 CVE-2024-32660 CVE-2024-32661 CVE-2024-32662 USN-6761-1 -- Anope vulnerability Ubuntu 24.04 LTS It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu1 No subscription required Medium CVE-2024-30187 USN-6763-1 -- libvirt vulnerability Ubuntu 24.04 LTS Martin Širokov discovered that libvirt incorrectly handled certain memory operations. A local attacker could possibly use this issue to access virtproxyd without authorization. Update Instructions: Run `sudo pro fix USN-6763-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.2 libvirt-dev - 10.0.0-2ubuntu8.2 libvirt-wireshark - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.2 libvirt-login-shell - 10.0.0-2ubuntu8.2 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.2 libnss-libvirt - 10.0.0-2ubuntu8.2 libvirt-daemon - 10.0.0-2ubuntu8.2 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.2 libvirt-daemon-config-network - 10.0.0-2ubuntu8.2 libvirt-l10n - 10.0.0-2ubuntu8.2 libvirt-clients - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.2 libvirt-daemon-system - 10.0.0-2ubuntu8.2 libvirt0 - 10.0.0-2ubuntu8.2 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.2 libvirt-sanlock - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.2 libvirt-doc - 10.0.0-2ubuntu8.2 No subscription required Medium CVE-2024-4418 USN-6768-1 -- GLib vulnerability Ubuntu 24.04 LTS Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation. Update Instructions: Run `sudo pro fix USN-6768-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-glib-2.0 - 2.80.0-6ubuntu3.1 libgirepository-2.0-dev - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-0t64 - 2.80.0-6ubuntu3.1 libglib2.0-tests - 2.80.0-6ubuntu3.1 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.1 libgirepository-2.0-0 - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.1 libglib2.0-data - 2.80.0-6ubuntu3.1 libglib2.0-doc - 2.80.0-6ubuntu3.1 libglib2.0-bin - 2.80.0-6ubuntu3.1 libglib2.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-dev-bin - 2.80.0-6ubuntu3.1 No subscription required Medium CVE-2024-34397 USN-6770-1 -- Fossil regression Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience. Update Instructions: Run `sudo pro fix USN-6770-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fossil - 1:2.23-1ubuntu0.1 No subscription required None https://launchpad.net/bugs/2064509 USN-6771-1 -- SQL parse vulnerability Ubuntu 24.04 LTS It was discovered that SQL parse incorrectly handled certain nested lists. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6771-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-sqlparse-doc - 0.4.4-1ubuntu0.1 python3-sqlparse - 0.4.4-1ubuntu0.1 sqlformat - 0.4.4-1ubuntu0.1 No subscription required Medium CVE-2024-4340 USN-6773-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. (CVE-2024-30045) It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service. (CVE-2024-30046) Update Instructions: Run `sudo pro fix USN-6773-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.105-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.105-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.105-8.0.5-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30045 CVE-2024-30046 USN-6780-1 -- idna vulnerability Ubuntu 24.04 LTS Guido Vranken discovered that idna did not properly manage certain inputs, which could lead to significant resource consumption. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6780-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-idna - 3.6-2ubuntu0.1 No subscription required Medium CVE-2024-3651 USN-6784-1 -- cJSON vulnerabilities Ubuntu 24.04 LTS It was discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472) Luo Jin discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. (CVE-2024-31755) Update Instructions: Run `sudo pro fix USN-6784-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcjson-dev - 1.7.17-1ubuntu0.1~esm2 libcjson1 - 1.7.17-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-50471 CVE-2023-50472 CVE-2024-31755 USN-6785-1 -- GNOME Remote Desktop vulnerability Ubuntu 24.04 LTS Matthias Gerstner discovered that GNOME Remote Desktop incorrectly performed certain user validation checks. A local attacker could possibly use this issue to obtain sensitive information, or take control of remote desktop connections. Update Instructions: Run `sudo pro fix USN-6785-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-remote-desktop - 46.2-1~ubuntu24.04.2 No subscription required Medium CVE-2024-5148 USN-6787-1 -- Jinja2 vulnerability Ubuntu 24.04 LTS It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-6787-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.1 python3-jinja2 - 3.1.2-1ubuntu1.1 No subscription required Medium CVE-2024-34064 USN-6788-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6788-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.2-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.2-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-27834 USN-6789-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled graphic on-click bindings. If a user were tricked into clicking a graphic in a specially crafted document, a remote attacker could possibly run arbitrary script. Update Instructions: Run `sudo pro fix USN-6789-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.3-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.3-0ubuntu0.24.04.2 python3-access2base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.3-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.3-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.3-0ubuntu0.24.04.2 ure-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.3-0ubuntu0.24.04.2 libridl-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.3-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.3-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.3-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.3-0ubuntu0.24.04.2 libunoil-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.3-0ubuntu0.24.04.2 python3-uno - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.3-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.3-0ubuntu0.24.04.2 libjurt-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.3-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.3-0ubuntu0.24.04.2 ure - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.3-0ubuntu0.24.04.2 libjuh-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.3-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.3-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-3044 USN-6790-1 -- amavisd-new vulnerability Ubuntu 24.04 LTS It was discovered that amavisd-new incorrectly handled certain MIME email messages with multiple boundary parameters. A remote attacker could possibly use this issue to bypass checks for banned files or malware. Update Instructions: Run `sudo pro fix USN-6790-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amavisd-new-postfix - 1:2.13.0-3ubuntu2 amavisd-new - 1:2.13.0-3ubuntu2 No subscription required Medium CVE-2024-28054 USN-6791-1 -- Unbound vulnerability Ubuntu 24.04 LTS It was discovered that Unbound could take part in a denial of service amplification attack known as DNSBomb. This update introduces certain resource limits to make the impact from Unbound significantly lower. Update Instructions: Run `sudo pro fix USN-6791-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unbound - 1.19.2-1ubuntu3.1 python3-unbound - 1.19.2-1ubuntu3.1 libunbound8 - 1.19.2-1ubuntu3.1 unbound-anchor - 1.19.2-1ubuntu3.1 unbound-host - 1.19.2-1ubuntu3.1 libunbound-dev - 1.19.2-1ubuntu3.1 No subscription required Low CVE-2024-33655 USN-6793-1 -- Git vulnerabilities Ubuntu 24.04 LTS It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32004) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. (CVE-2024-32021) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32465) Update Instructions: Run `sudo pro fix USN-6793-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.1 gitweb - 1:2.43.0-1ubuntu7.1 git-gui - 1:2.43.0-1ubuntu7.1 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.1 gitk - 1:2.43.0-1ubuntu7.1 git-all - 1:2.43.0-1ubuntu7.1 git-mediawiki - 1:2.43.0-1ubuntu7.1 git-daemon-run - 1:2.43.0-1ubuntu7.1 git-man - 1:2.43.0-1ubuntu7.1 git-doc - 1:2.43.0-1ubuntu7.1 git-svn - 1:2.43.0-1ubuntu7.1 git-cvs - 1:2.43.0-1ubuntu7.1 git-email - 1:2.43.0-1ubuntu7.1 No subscription required Medium CVE-2024-32002 CVE-2024-32004 CVE-2024-32020 CVE-2024-32021 CVE-2024-32465 USN-6794-1 -- FRR vulnerabilities Ubuntu 24.04 LTS It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6794-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.1 frr-snmp - 8.4.4-1.1ubuntu6.1 frr-doc - 8.4.4-1.1ubuntu6.1 frr-pythontools - 8.4.4-1.1ubuntu6.1 No subscription required Medium CVE-2024-31948 CVE-2024-31950 CVE-2024-31951 CVE-2024-34088 USN-6796-1 -- TPM2 Software Stack vulnerabilities Ubuntu 24.04 LTS Fergus Dall discovered that TPM2 Software Stack did not properly handle layer arrays. An attacker could possibly use this issue to cause TPM2 Software Stack to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-22745) Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not validate the quote data after deserialization. An attacker could generate an arbitrary quote and cause TPM2 Software Stack to have unknown behavior. (CVE-2024-29040) Update Instructions: Run `sudo pro fix USN-6796-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtss2-esys-3.0.2-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-sys1t64 - 4.0.1-7.1ubuntu5.1 libtss2-mu-4.0.1-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-spi-helper0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-libtpms0t64 - 4.0.1-7.1ubuntu5.1 libtss2-doc - 4.0.1-7.1ubuntu5.1 libtss2-tcti-swtpm0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-device0t64 - 4.0.1-7.1ubuntu5.1 libtss2-rc0t64 - 4.0.1-7.1ubuntu5.1 libtss2-fapi1t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-mssim0t64 - 4.0.1-7.1ubuntu5.1 libtss2-policy0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-pcap0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tctildr0t64 - 4.0.1-7.1ubuntu5.1 libtss2-dev - 4.0.1-7.1ubuntu5.1 libtss2-tcti-cmd0t64 - 4.0.1-7.1ubuntu5.1 No subscription required Medium CVE-2023-22745 CVE-2024-29040 USN-6797-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors did not properly restrict access to certain hardware features when using Intel® SGX or Intel® TDX. This may allow a privileged local user to potentially further escalate their privileges on the system. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-22655) It was discovered that some Intel® Atom® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746) It was discovered that some Intel® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-38575) It was discovered that some Intel® Processors did not properly enforce bus lock regulator protections. A remote attacker could use this to cause a denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368) It was discovered that some Intel® Xeon® D Processors did not properly calculate the SGX base key when using Intel® SGX. A privileged local attacker could use this to obtain sensitive information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-43490) It was discovered that some Intel® Processors did not properly protect against concurrent accesses. A local attacker could use this to obtain sensitive information. (CVE-2023-45733) It was discovered that some Intel® Processors TDX module software did not properly validate input. A privileged local attacker could use this information to potentially further escalate their privileges on the system. (CVE-2023-45745, CVE-2023-47855) It was discovered that some Intel® Core™ Ultra processors did not properly handle particular instruction sequences. A local attacker could use this issue to cause a denial of service. (CVE-2023-46103) Update Instructions: Run `sudo pro fix USN-6797-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240514.0ubuntu0.24.04.1 No subscription required Medium CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490 CVE-2023-45733 CVE-2023-45745 CVE-2023-46103 CVE-2023-47855 USN-6798-1 -- GStreamer Base Plugins vulnerability Ubuntu 24.04 LTS It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6798-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-x - 1.24.2-1ubuntu0.1 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-gl - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.1 gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-alsa - 1.24.2-1ubuntu0.1 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.1 No subscription required Medium CVE-2024-4453 USN-6799-1 -- Werkzeug vulnerability Ubuntu 24.04 LTS It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances. Update Instructions: Run `sudo pro fix USN-6799-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-werkzeug - 3.0.1-3ubuntu0.1 python-werkzeug-doc - 3.0.1-3ubuntu0.1 No subscription required Medium CVE-2024-34069 USN-6801-1 -- PyMySQL vulnerability Ubuntu 24.04 LTS It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-6801-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pymysql - 1.0.2-2ubuntu1.1 python-pymysql-doc - 1.0.2-2ubuntu1.1 No subscription required Medium CVE-2024-36039 USN-6802-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users. NOTE: This update will only fix fresh PostgreSQL installations. Current PostgreSQL installations will remain vulnerable to this issue until manual steps are performed. Please see the instructions in the changelog located at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated packages have been installed, or in the PostgreSQL release notes located here: https://www.postgresql.org/docs/16/release-16-3.html https://www.postgresql.org/docs/15/release-15-7.html https://www.postgresql.org/docs/14/release-14-12.html Update Instructions: Run `sudo pro fix USN-6802-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postgresql-server-dev-16 - 16.3-0ubuntu0.24.04.1 libecpg6 - 16.3-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.3-0ubuntu0.24.04.1 libpq-dev - 16.3-0ubuntu0.24.04.1 postgresql-16 - 16.3-0ubuntu0.24.04.1 libpgtypes3 - 16.3-0ubuntu0.24.04.1 libecpg-dev - 16.3-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.3-0ubuntu0.24.04.1 libpq5 - 16.3-0ubuntu0.24.04.1 postgresql-client-16 - 16.3-0ubuntu0.24.04.1 postgresql-doc-16 - 16.3-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.3-0ubuntu0.24.04.1 libecpg-compat3 - 16.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-4317 USN-6803-1 -- FFmpeg vulnerabilities Ubuntu 24.04 LTS Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49502) Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49528) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50007) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50008) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-50009) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010) Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51793) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31582) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585) Update Instructions: Run `sudo pro fix USN-6803-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm1 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm1 libavcodec-dev - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm1 libavcodec60 - 7:6.1.1-3ubuntu5+esm1 libavdevice-dev - 7:6.1.1-3ubuntu5+esm1 libavdevice60 - 7:6.1.1-3ubuntu5+esm1 libavfilter-dev - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm1 libavfilter9 - 7:6.1.1-3ubuntu5+esm1 libavformat-dev - 7:6.1.1-3ubuntu5+esm1 libavformat-extra - 7:6.1.1-3ubuntu5+esm1 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm1 libavformat60 - 7:6.1.1-3ubuntu5+esm1 libavutil-dev - 7:6.1.1-3ubuntu5+esm1 libavutil58 - 7:6.1.1-3ubuntu5+esm1 libpostproc-dev - 7:6.1.1-3ubuntu5+esm1 libpostproc57 - 7:6.1.1-3ubuntu5+esm1 libswresample-dev - 7:6.1.1-3ubuntu5+esm1 libswresample4 - 7:6.1.1-3ubuntu5+esm1 libswscale-dev - 7:6.1.1-3ubuntu5+esm1 libswscale7 - 7:6.1.1-3ubuntu5+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-49501 CVE-2023-49502 CVE-2023-49528 CVE-2023-50007 CVE-2023-50008 CVE-2023-50009 CVE-2023-50010 CVE-2023-51793 CVE-2023-51794 CVE-2023-51795 CVE-2023-51796 CVE-2023-51798 CVE-2024-31578 CVE-2024-31582 CVE-2024-31585 USN-6804-1 -- GNU C Library vulnerabilities Ubuntu 24.04 LTS It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33599) It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33600) It was discovered that GNU C Library nscd daemon did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33601) It was discovered that GNU C Library nscd daemon did not properly handle memory allocation, which could lead to memory corruption. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33602) Update Instructions: Run `sudo pro fix USN-6804-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.2 glibc-doc - 2.39-0ubuntu8.2 libc6-i386 - 2.39-0ubuntu8.2 libc6-s390 - 2.39-0ubuntu8.2 libc6-dev-i386 - 2.39-0ubuntu8.2 nscd - 2.39-0ubuntu8.2 libc6-dev-x32 - 2.39-0ubuntu8.2 libc6-dev - 2.39-0ubuntu8.2 libc6-amd64 - 2.39-0ubuntu8.2 libc6-x32 - 2.39-0ubuntu8.2 libc6-dev-amd64 - 2.39-0ubuntu8.2 libc-dev-bin - 2.39-0ubuntu8.2 libc6 - 2.39-0ubuntu8.2 locales-all - 2.39-0ubuntu8.2 libc-devtools - 2.39-0ubuntu8.2 glibc-source - 2.39-0ubuntu8.2 libc6-dev-s390 - 2.39-0ubuntu8.2 locales - 2.39-0ubuntu8.2 No subscription required Medium CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602 USN-6805-1 -- libarchive vulnerability Ubuntu 24.04 LTS It was discovered that libarchive incorrectly handled certain RAR archive files. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6805-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.1 libarchive13t64 - 3.7.2-2ubuntu0.1 libarchive-tools - 3.7.2-2ubuntu0.1 No subscription required Medium CVE-2024-26256 USN-6806-1 -- GDK-PixBuf vulnerability Ubuntu 24.04 LTS Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf library did not properly handle certain ANI files. An attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or to possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6806-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgdk-pixbuf-2.0-dev - 2.42.10+dfsg-3ubuntu3.1 gdk-pixbuf-tests - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-common - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-bin - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-doc - 2.42.10+dfsg-3ubuntu3.1 gir1.2-gdkpixbuf-2.0 - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf-2.0-0 - 2.42.10+dfsg-3ubuntu3.1 No subscription required Medium CVE-2022-48622 USN-6810-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094) Update Instructions: Run `sudo pro fix USN-6810-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-doc - 8u412-ga-1~24.04.2 openjdk-8-jdk - 8u412-ga-1~24.04.2 openjdk-8-jre-headless - 8u412-ga-1~24.04.2 openjdk-8-jre - 8u412-ga-1~24.04.2 openjdk-8-jdk-headless - 8u412-ga-1~24.04.2 openjdk-8-source - 8u412-ga-1~24.04.2 openjdk-8-jre-zero - 8u412-ga-1~24.04.2 openjdk-8-demo - 8u412-ga-1~24.04.2 No subscription required Medium CVE-2024-21011 CVE-2024-21068 CVE-2024-21085 CVE-2024-21094 USN-6814-1 -- libvpx vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6814-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.1 libvpx9 - 1.14.0-1ubuntu2.1 libvpx-doc - 1.14.0-1ubuntu2.1 vpx-tools - 1.14.0-1ubuntu2.1 No subscription required Medium CVE-2024-5197 USN-6815-1 -- AOM vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6815-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaom-doc - 3.8.2-2ubuntu0.1 libaom-dev - 3.8.2-2ubuntu0.1 libaom3 - 3.8.2-2ubuntu0.1 aom-tools - 3.8.2-2ubuntu0.1 No subscription required Medium CVE-2024-5171 USN-6816-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053, CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870, CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929, CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975, CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871, CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653, CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796, CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826, CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895, CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801, CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049, CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661, CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956, CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873, CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650, CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038, CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959, CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433, CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939, CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029, CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074, CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391, CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026, CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662, CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068, CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389, CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798, CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046, CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954, CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883, CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948, CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869, CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073, CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894, CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076, CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957, CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813, CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968, CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874, CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809, CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808, CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969, CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078, CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955, CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945, CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054, CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656, CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865, CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950, CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971, CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036, CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075, CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970, CVE-2024-27031) Update Instructions: Run `sudo pro fix USN-6816-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-raspi-tools-6.8.0-1005 - 6.8.0-1005.5 linux-buildinfo-6.8.0-1005-raspi - 6.8.0-1005.5 linux-tools-raspi - 6.8.0-1005.5 linux-tools-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-raspi - 6.8.0-1005.5 linux-image-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi-headers-6.8.0-1005 - 6.8.0-1005.5 linux-image-raspi - 6.8.0-1005.5 linux-modules-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi - 6.8.0-1005.5 No subscription required linux-modules-extra-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-source-6.8.0 - 6.8.0-1006.6 linux-tools-ibm - 6.8.0-1006.6 linux-tools-ibm-lts-24.04 - 6.8.0-1006.6 linux-image-ibm - 6.8.0-1006.6 linux-image-ibm-classic - 6.8.0-1006.6 linux-headers-ibm-lts-24.04 - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-ibm - 6.8.0-1006.6 linux-tools-ibm-classic - 6.8.0-1006.6 linux-tools-6.8.0-1006-ibm - 6.8.0-1006.6 linux-headers-6.8.0-1006-ibm - 6.8.0-1006.6 linux-image-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-classic - 6.8.0-1006.6 linux-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-classic - 6.8.0-1006.6 linux-modules-iwlwifi-ibm - 6.8.0-1006.6 linux-image-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-headers-6.8.0-1006 - 6.8.0-1006.6 linux-headers-ibm-classic - 6.8.0-1006.6 linux-ibm - 6.8.0-1006.6 linux-ibm-cloud-tools-common - 6.8.0-1006.6 linux-headers-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-ibm - 6.8.0-1006.6 No subscription required linux-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-common - 6.8.0-35.35 linux-headers-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-virtual - 6.8.0-35.35 linux-headers-generic-lpae - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04d - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-laptop-23.10 - 6.8.0-35.35 linux-kvm - 6.8.0-35.35 linux-tools-6.8.0-35 - 6.8.0-35.35 linux-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-generic-64k - 6.8.0-35.35 linux-image-virtual - 6.8.0-35.35 linux-doc - 6.8.0-35.35 linux-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic - 6.8.0-35.35 linux-image-generic - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-image-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic-64k - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-virtual-hwe-24.04 - 6.8.0-35.35 linux-modules-usbio-6.8.0-35-generic - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-oem-20.04c - 6.8.0-35.35 linux-modules-ipu6-6.8.0-35-generic - 6.8.0-35.35 linux-tools-oem-20.04b - 6.8.0-35.35 linux-modules-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-modules-iwlwifi-6.8.0-35-generic - 6.8.0-35.35 linux-modules-6.8.0-35-generic - 6.8.0-35.35 linux-crashdump - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04 - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic - 6.8.0-35.35 linux-headers-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-iwlwifi-generic - 6.8.0-35.35 linux-modules-extra-6.8.0-35-generic - 6.8.0-35.35 linux-source - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-oem-22.04 - 6.8.0-35.35 linux-image-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-kvm - 6.8.0-35.35 linux-tools-generic-lpae - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-virtual - 6.8.0-35.35 linux-tools-oem-22.04 - 6.8.0-35.35 linux-tools-generic - 6.8.0-35.35 linux-laptop-23.10 - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-tools-6.8.0-35-generic-64k - 6.8.0-35.35 linux-tools-6.8.0-35-generic - 6.8.0-35.35 linux-image-uc-generic - 6.8.0-35.35 linux-cloud-tools-generic - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-35.35 linux-image-oem-20.04c - 6.8.0-35.35 linux-image-oem-20.04b - 6.8.0-35.35 linux-generic-lpae - 6.8.0-35.35 linux-tools-host - 6.8.0-35.35 linux-headers-generic-64k - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04 - 6.8.0-35.35 linux-generic - 6.8.0-35.35 linux-image-oem-20.04 - 6.8.0-35.35 linux-oem-20.04d - 6.8.0-35.35 linux-headers-generic-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04c - 6.8.0-35.35 linux-image-oem-22.04 - 6.8.0-35.35 linux-headers-6.8.0-35-generic - 6.8.0-35.35 linux-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-lib-rust-6.8.0-35-generic - 6.8.0-35.35 linux-image-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-6.8.0-35 - 6.8.0-35.35 linux-tools-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-common - 6.8.0-35.35 linux-image-generic-lpae - 6.8.0-35.35 linux-oem-20.04b - 6.8.0-35.35 linux-image-extra-virtual - 6.8.0-35.35 linux-modules-ipu6-generic - 6.8.0-35.35 linux-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-image-laptop-23.10 - 6.8.0-35.35 linux-image-generic-hwe-24.04-edge - 6.8.0-35.35 linux-cloud-tools-6.8.0-35-generic - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04 - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04 - 6.8.0-35.35 linux-headers-generic-hwe-24.04-edge - 6.8.0-35.35 linux-generic-64k - 6.8.0-35.35 linux-headers-generic - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-laptop-23.10 - 6.8.0-35.35 linux-libc-dev - 6.8.0-35.35 linux-modules-iwlwifi-oem-22.04 - 6.8.0-35.35 linux-headers-virtual - 6.8.0-35.35 linux-image-kvm - 6.8.0-35.35 linux-source-6.8.0 - 6.8.0-35.35 linux-headers-oem-22.04 - 6.8.0-35.35 linux-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-tools-kvm - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic-64k - 6.8.0-35.35 linux-headers-oem-20.04b - 6.8.0-35.35 linux-headers-oem-20.04c - 6.8.0-35.35 linux-tools-virtual - 6.8.0-35.35 linux-headers-oem-20.04d - 6.8.0-35.35 linux-cloud-tools-6.8.0-35 - 6.8.0-35.35 linux-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic - 6.8.0-35.35 No subscription required linux-image-uc-6.8.0-35-generic-64k - 6.8.0-35.35+1 linux-image-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-uc-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-6.8.0-35-generic-64k - 6.8.0-35.35+1 No subscription required linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-common - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-common - 6.8.0-35.35.1 linux-tools-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-host - 6.8.0-35.35.1 linux-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-lowlatency-headers-6.8.0-35 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-modules-iwlwifi-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-6.8.0-35 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-lowlatency-64k - 6.8.0-35.35.1 linux-cloud-tools-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-lib-rust-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-6.8.0-35 - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency - 6.8.0-35.35.1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gcp-headers-6.8.0-1008 - 6.8.0-1008.9 linux-image-gcp - 6.8.0-1008.9 linux-modules-extra-6.8.0-1008-gcp - 6.8.0-1008.9 linux-headers-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-gcp - 6.8.0-1008.9 linux-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-gcp - 6.8.0-1008.9 linux-gcp-tools-6.8.0-1008 - 6.8.0-1008.9 linux-headers-gcp - 6.8.0-1008.9 linux-image-unsigned-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-6.8.0-1008-gcp - 6.8.0-1008.9 linux-image-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-extra-gcp - 6.8.0-1008.9 linux-buildinfo-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-6.8.0-1008-gcp - 6.8.0-1008.9 No subscription required linux-modules-extra-aws - 6.8.0-1009.9 linux-tools-aws - 6.8.0-1009.9 linux-aws-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-aws - 6.8.0-1009.9 linux-image-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-headers-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws - 6.8.0-1009.9 linux-headers-aws - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-headers-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-aws - 6.8.0-1009.9 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-2 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-ipu6-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-6.8.0-1006-oem - 6.8.0-1006.6 linux-tools-6.8.0-1006-oem - 6.8.0-1006.6 linux-headers-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-uc-6.8.0-1006-oem - 6.8.0-1006.6 linux-oem-6.8-tools-6.8.0-1006 - 6.8.0-1006.6 linux-oem-6.8-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oem - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-usbio-6.8.0-1006-oem - 6.8.0-1006.6 No subscription required linux-tools-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04 - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04a - 6.8.0-1006.6+1 linux-headers-oem-24.04a - 6.8.0-1006.6+1 linux-tools-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04a - 6.8.0-1006.6+1 linux-oem-24.04a - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04 - 6.8.0-1006.6+1 linux-oem-24.04 - 6.8.0-1006.6+1 linux-headers-oem-24.04 - 6.8.0-1006.6+1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gke-headers-6.8.0-1004 - 6.8.0-1004.7 linux-modules-iwlwifi-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-gke - 6.8.0-1004.7 linux-image-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-extra-6.8.0-1004-gke - 6.8.0-1004.7 linux-gke - 6.8.0-1004.7 linux-buildinfo-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-gke - 6.8.0-1004.7 linux-gke-tools-6.8.0-1004 - 6.8.0-1004.7 linux-headers-gke - 6.8.0-1004.7 linux-modules-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-iwlwifi-gke - 6.8.0-1004.7 linux-headers-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-unsigned-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-6.8.0-1004-gke - 6.8.0-1004.7 No subscription required linux-image-6.8.0-1008-azure - 6.8.0-1008.8 linux-image-azure-fde - 6.8.0-1008.8 linux-azure-tools-6.8.0-1008 - 6.8.0-1008.8 linux-azure - 6.8.0-1008.8 linux-azure-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-azure - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-azure - 6.8.0-1008.8 linux-cloud-tools-azure - 6.8.0-1008.8 linux-headers-6.8.0-1008-azure - 6.8.0-1008.8 linux-tools-azure - 6.8.0-1008.8 linux-modules-iwlwifi-azure - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-azure - 6.8.0-1008.8 linux-image-6.8.0-1008-azure-fde - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-fde - 6.8.0-1008.8 linux-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-cloud-tools-6.8.0-1008 - 6.8.0-1008.8 linux-headers-azure - 6.8.0-1008.8 linux-cloud-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-azure - 6.8.0-1008.8 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6823-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.37 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-37.html https://www.oracle.com/security-alerts/cpuapr2024.html Update Instructions: Run `sudo pro fix USN-6823-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 8.0.37-0ubuntu0.24.04.1 libmysqlclient-dev - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-router - 8.0.37-0ubuntu0.24.04.1 mysql-server - 8.0.37-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.37-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite - 8.0.37-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.37-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20994 CVE-2024-20998 CVE-2024-21000 CVE-2024-21008 CVE-2024-21009 CVE-2024-21013 CVE-2024-21047 CVE-2024-21054 CVE-2024-21060 CVE-2024-21062 CVE-2024-21069 CVE-2024-21087 CVE-2024-21096 CVE-2024-21102 USN-6827-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory when performing certain cropping operations, leading to a heap buffer overflow. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6827-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl - 4.5.1+git230720-4ubuntu2.1 libtiff5-dev - 4.5.1+git230720-4ubuntu2.1 libtiff-dev - 4.5.1+git230720-4ubuntu2.1 libtiffxx6 - 4.5.1+git230720-4ubuntu2.1 libtiff6 - 4.5.1+git230720-4ubuntu2.1 libtiff-tools - 4.5.1+git230720-4ubuntu2.1 libtiff-doc - 4.5.1+git230720-4ubuntu2.1 No subscription required Low CVE-2023-3164 USN-6830-1 -- libndp vulnerability Ubuntu 24.04 LTS It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6830-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libndp0 - 1.8-1fakesync1ubuntu0.24.04.1 libndp-dev - 1.8-1fakesync1ubuntu0.24.04.1 libndp-tools - 1.8-1fakesync1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5564 USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31607, CVE-2023-31608, CVE-2023-31609, CVE-2023-31610, CVE-2023-31611, CVE-2023-31616, CVE-2023-31617, CVE-2023-31618, CVE-2023-31619, CVE-2023-31623, CVE-2023-31625, CVE-2023-31628) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-31612, CVE-2023-31613, CVE-2023-31614, CVE-2023-31615) Update Instructions: Run `sudo pro fix USN-6832-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31607 CVE-2023-31608 CVE-2023-31609 CVE-2023-31610 CVE-2023-31611 CVE-2023-31612 CVE-2023-31613 CVE-2023-31614 CVE-2023-31615 CVE-2023-31616 CVE-2023-31617 CVE-2023-31618 CVE-2023-31619 CVE-2023-31623 CVE-2023-31625 CVE-2023-31628 USN-6833-1 -- VTE vulnerability Ubuntu 24.04 LTS Siddharth Dushantha discovered that VTE incorrectly handled large window resize escape sequences. An attacker could possibly use this issue to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6833-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvte-2.91-gtk4-dev - 0.76.0-1ubuntu0.1 libvte-2.91-common - 0.76.0-1ubuntu0.1 gir1.2-vte-3.91 - 0.76.0-1ubuntu0.1 gir1.2-vte-2.91 - 0.76.0-1ubuntu0.1 libvte-2.91-doc - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-0 - 0.76.0-1ubuntu0.1 libvte-2.91-0 - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-doc - 0.76.0-1ubuntu0.1 libvte-2.91-dev - 0.76.0-1ubuntu0.1 No subscription required Medium CVE-2024-37535 USN-6835-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871) Update Instructions: Run `sudo pro fix USN-6835-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.1 libgs10-common - 10.02.1~dfsg1-0ubuntu7.1 libgs10 - 10.02.1~dfsg1-0ubuntu7.1 libgs-common - 10.02.1~dfsg1-0ubuntu7.1 libgs-dev - 10.02.1~dfsg1-0ubuntu7.1 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.1 No subscription required Medium CVE-2023-52722 CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 CVE-2024-33871 USN-6836-1 -- SSSD vulnerability Ubuntu 24.04 LTS It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources. Update Instructions: Run `sudo pro fix USN-6836-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsss-certmap-dev - 2.9.4-1.1ubuntu6.1 libipa-hbac-dev - 2.9.4-1.1ubuntu6.1 sssd-ad - 2.9.4-1.1ubuntu6.1 libsss-sudo - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap0 - 2.9.4-1.1ubuntu6.1 libnss-sss - 2.9.4-1.1ubuntu6.1 sssd-ipa - 2.9.4-1.1ubuntu6.1 sssd-passkey - 2.9.4-1.1ubuntu6.1 libipa-hbac0t64 - 2.9.4-1.1ubuntu6.1 libsss-idmap-dev - 2.9.4-1.1ubuntu6.1 python3-libsss-nss-idmap - 2.9.4-1.1ubuntu6.1 sssd-common - 2.9.4-1.1ubuntu6.1 python3-sss - 2.9.4-1.1ubuntu6.1 libpam-sss - 2.9.4-1.1ubuntu6.1 sssd - 2.9.4-1.1ubuntu6.1 libsss-idmap0 - 2.9.4-1.1ubuntu6.1 sssd-idp - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap-dev - 2.9.4-1.1ubuntu6.1 sssd-kcm - 2.9.4-1.1ubuntu6.1 libsss-certmap0 - 2.9.4-1.1ubuntu6.1 python3-libipa-hbac - 2.9.4-1.1ubuntu6.1 sssd-ldap - 2.9.4-1.1ubuntu6.1 sssd-tools - 2.9.4-1.1ubuntu6.1 sssd-ad-common - 2.9.4-1.1ubuntu6.1 sssd-krb5-common - 2.9.4-1.1ubuntu6.1 sssd-dbus - 2.9.4-1.1ubuntu6.1 sssd-krb5 - 2.9.4-1.1ubuntu6.1 sssd-proxy - 2.9.4-1.1ubuntu6.1 No subscription required Medium CVE-2023-3758 USN-6837-1 -- Rack vulnerabilities Ubuntu 24.04 LTS It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-27530) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6837-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.1 No subscription required Medium CVE-2023-27530 CVE-2024-25126 CVE-2024-26141 CVE-2024-26146 USN-6838-1 -- Ruby vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282) Update Instructions: Run `sudo pro fix USN-6838-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby3.2 - 3.2.3-1ubuntu0.24.04.1 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.1 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.1 libruby3.2 - 3.2.3-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-27281 CVE-2024-27282 USN-6839-1 -- MariaDB vulnerability Ubuntu 24.04 LTS A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.6.18 in Ubuntu 22.04 LTS and to 10.11.8 in Ubuntu 23.10 and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6839-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mariadb-plugin-provider-lzo - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.8-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-common - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test - 1:10.11.8-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-21096 USN-6841-1 -- PHP vulnerability Ubuntu 24.04 LTS It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information. Update Instructions: Run `sudo pro fix USN-6841-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php8.3-cgi - 8.3.6-0ubuntu0.24.04.1 php8.3-xsl - 8.3.6-0ubuntu0.24.04.1 php8.3-fpm - 8.3.6-0ubuntu0.24.04.1 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.1 php8.3-zip - 8.3.6-0ubuntu0.24.04.1 php8.3-curl - 8.3.6-0ubuntu0.24.04.1 php8.3-ldap - 8.3.6-0ubuntu0.24.04.1 php8.3-gmp - 8.3.6-0ubuntu0.24.04.1 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.1 php8.3-gd - 8.3.6-0ubuntu0.24.04.1 php8.3-common - 8.3.6-0ubuntu0.24.04.1 php8.3-enchant - 8.3.6-0ubuntu0.24.04.1 php8.3-odbc - 8.3.6-0ubuntu0.24.04.1 php8.3-cli - 8.3.6-0ubuntu0.24.04.1 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.1 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.1 php8.3-mysql - 8.3.6-0ubuntu0.24.04.1 php8.3-dba - 8.3.6-0ubuntu0.24.04.1 libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-soap - 8.3.6-0ubuntu0.24.04.1 php8.3-opcache - 8.3.6-0ubuntu0.24.04.1 php8.3-sybase - 8.3.6-0ubuntu0.24.04.1 php8.3-pspell - 8.3.6-0ubuntu0.24.04.1 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.1 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.1 php8.3-dev - 8.3.6-0ubuntu0.24.04.1 php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-tidy - 8.3.6-0ubuntu0.24.04.1 php8.3-interbase - 8.3.6-0ubuntu0.24.04.1 php8.3-readline - 8.3.6-0ubuntu0.24.04.1 php8.3-intl - 8.3.6-0ubuntu0.24.04.1 php8.3-imap - 8.3.6-0ubuntu0.24.04.1 php8.3-xml - 8.3.6-0ubuntu0.24.04.1 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.1 php8.3-snmp - 8.3.6-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-5458 USN-6843-1 -- Plasma Workspace vulnerability Ubuntu 24.04 LTS Fabian Vogt discovered that Plasma Workspace incorrectly handled connections via ICE. A local attacker could possibly use this issue to gain access to another user's session manager and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6843-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plasma-workspace-dev - 4:5.27.11-0ubuntu4.1 libweather-ion7 - 4:5.27.11-0ubuntu4.1 libkfontinst5 - 4:5.27.11-0ubuntu4.1 libcolorcorrect5 - 4:5.27.11-0ubuntu4.1 libkworkspace5-5 - 4:5.27.11-0ubuntu4.1 plasma-workspace-data - 4:5.27.11-0ubuntu4.1 plasma-workspace-wayland - 4:5.27.11-0ubuntu4.1 sddm-theme-breeze - 4:5.27.11-0ubuntu4.1 libplasma-geolocation-interface5 - 4:5.27.11-0ubuntu4.1 libnotificationmanager1 - 4:5.27.11-0ubuntu4.1 libkfontinstui5 - 4:5.27.11-0ubuntu4.1 libtaskmanager6 - 4:5.27.11-0ubuntu4.1 plasma-workspace - 4:5.27.11-0ubuntu4.1 No subscription required Medium CVE-2024-36041 USN-6844-1 -- CUPS vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.1 cups-bsd - 2.4.7-1.2ubuntu7.1 cups-common - 2.4.7-1.2ubuntu7.1 cups-core-drivers - 2.4.7-1.2ubuntu7.1 cups-server-common - 2.4.7-1.2ubuntu7.1 cups-client - 2.4.7-1.2ubuntu7.1 libcupsimage2t64 - 2.4.7-1.2ubuntu7.1 libcupsimage2-dev - 2.4.7-1.2ubuntu7.1 cups-ipp-utils - 2.4.7-1.2ubuntu7.1 cups-ppdc - 2.4.7-1.2ubuntu7.1 cups - 2.4.7-1.2ubuntu7.1 libcups2t64 - 2.4.7-1.2ubuntu7.1 cups-daemon - 2.4.7-1.2ubuntu7.1 No subscription required Medium CVE-2024-35235 USN-6844-2 -- CUPS regression Ubuntu 24.04 LTS USN-6844-1 fixed vulnerabilities in the CUPS package. The update lead to the discovery of a regression in CUPS with regards to how the cupsd daemon handles Listen configuration directive. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.2 cups-bsd - 2.4.7-1.2ubuntu7.2 cups-common - 2.4.7-1.2ubuntu7.2 cups-core-drivers - 2.4.7-1.2ubuntu7.2 cups-server-common - 2.4.7-1.2ubuntu7.2 cups-client - 2.4.7-1.2ubuntu7.2 libcupsimage2t64 - 2.4.7-1.2ubuntu7.2 libcupsimage2-dev - 2.4.7-1.2ubuntu7.2 cups-ipp-utils - 2.4.7-1.2ubuntu7.2 cups-ppdc - 2.4.7-1.2ubuntu7.2 cups - 2.4.7-1.2ubuntu7.2 libcups2t64 - 2.4.7-1.2ubuntu7.2 cups-daemon - 2.4.7-1.2ubuntu7.2 No subscription required None https://launchpad.net/bugs/2070315 USN-6851-1 -- Netplan vulnerabilities Ubuntu 24.04 LTS Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.1 netplan-generator - 1.0-2ubuntu1.1 libnetplan1 - 1.0-2ubuntu1.1 python3-netplan - 1.0-2ubuntu1.1 libnetplan-dev - 1.0-2ubuntu1.1 No subscription required Medium CVE-2022-4968 https://launchpad.net/bugs/2066258 https://launchpad.net/bugs/1987842 https://launchpad.net/bugs/2065738 USN-6851-2 -- Netplan regression Ubuntu 24.04 LTS USN-6851-1 fixed vulnerabilities in Netplan. The update lead to the discovery of a regression in netplan which caused systemctl enable to fail on systems where systemd is not running. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.2 netplan-generator - 1.0-2ubuntu1.2 libnetplan1 - 1.0-2ubuntu1.2 python3-netplan - 1.0-2ubuntu1.2 libnetplan-dev - 1.0-2ubuntu1.2 No subscription required None https://launchpad.net/bugs/2071333 USN-6852-1 -- Wget vulnerability Ubuntu 24.04 LTS It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected. Update Instructions: Run `sudo pro fix USN-6852-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: wget - 1.21.4-1ubuntu4.1 No subscription required Medium CVE-2024-38428 USN-6855-1 -- libcdio vulnerability Ubuntu 24.04 LTS Mansour Gashasbi discovered that libcdio incorrectly handled certain memory operations when parsing an ISO file, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6855-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiso9660-dev - 2.1.0-4.1ubuntu1.2 libiso9660-11t64 - 2.1.0-4.1ubuntu1.2 libcdio-utils - 2.1.0-4.1ubuntu1.2 libcdio19t64 - 2.1.0-4.1ubuntu1.2 libiso9660++0t64 - 2.1.0-4.1ubuntu1.2 libudf-dev - 2.1.0-4.1ubuntu1.2 libcdio++1t64 - 2.1.0-4.1ubuntu1.2 libiso9660++-dev - 2.1.0-4.1ubuntu1.2 libudf0t64 - 2.1.0-4.1ubuntu1.2 libcdio++-dev - 2.1.0-4.1ubuntu1.2 libcdio-dev - 2.1.0-4.1ubuntu1.2 No subscription required Medium CVE-2024-36600 USN-6859-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. Update Instructions: Run `sudo pro fix USN-6859-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.3 openssh-server - 1:9.6p1-3ubuntu13.3 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.3 ssh - 1:9.6p1-3ubuntu13.3 openssh-tests - 1:9.6p1-3ubuntu13.3 openssh-sftp-server - 1:9.6p1-3ubuntu13.3 No subscription required High CVE-2024-6387 USN-6860-1 -- OpenVPN vulnerabilities Ubuntu 24.04 LTS Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update Instructions: Run `sudo pro fix USN-6860-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.9-1ubuntu4.1 No subscription required Medium CVE-2024-28882 CVE-2024-5594 USN-6863-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6863-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-tools-6.8.0-1006 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-raspi - 6.8.0-1006.6 linux-tools-raspi - 6.8.0-1006.6 linux-tools-6.8.0-1006-raspi - 6.8.0-1006.6 linux-image-6.8.0-1006-raspi - 6.8.0-1006.6 linux-headers-raspi - 6.8.0-1006.6 linux-modules-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-headers-6.8.0-1006 - 6.8.0-1006.6 linux-raspi - 6.8.0-1006.6 linux-image-raspi - 6.8.0-1006.6 No subscription required linux-image-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-tools-6.8.0-1007 - 6.8.0-1007.7 linux-ibm-source-6.8.0 - 6.8.0-1007.7 linux-modules-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-ibm-lts-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-ibm - 6.8.0-1007.7 linux-modules-extra-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-ibm - 6.8.0-1007.7 linux-image-ibm-classic - 6.8.0-1007.7 linux-headers-ibm-lts-24.04 - 6.8.0-1007.7 linux-tools-ibm-classic - 6.8.0-1007.7 linux-tools-ibm - 6.8.0-1007.7 linux-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-classic - 6.8.0-1007.7 linux-modules-iwlwifi-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-ibm - 6.8.0-1007.7 linux-ibm-headers-6.8.0-1007 - 6.8.0-1007.7 linux-headers-ibm-classic - 6.8.0-1007.7 linux-ibm - 6.8.0-1007.7 linux-ibm-cloud-tools-common - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-classic - 6.8.0-1007.7 No subscription required linux-modules-extra-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-nvidia-64k - 6.8.0-1008.8 linux-nvidia-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-nvidia - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-nvidia-64k - 6.8.0-1008.8 linux-cloud-tools-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-nvidia-64k - 6.8.0-1008.8 linux-nvidia-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-nvidia - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1008.8 linux-nvidia - 6.8.0-1008.8 linux-nvidia-tools-host - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-headers-nvidia - 6.8.0-1008.8 linux-headers-nvidia-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 No subscription required linux-generic-hwe-24.04 - 6.8.0-36.36 linux-tools-common - 6.8.0-36.36 linux-modules-6.8.0-36-generic-64k - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-oem-20.04 - 6.8.0-36.36 linux-cloud-tools-virtual - 6.8.0-36.36 linux-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-generic-lpae - 6.8.0-36.36 linux-modules-iwlwifi-6.8.0-36-generic - 6.8.0-36.36 linux-image-6.8.0-36-generic - 6.8.0-36.36 linux-modules-6.8.0-36-generic - 6.8.0-36.36 linux-headers-laptop-23.10 - 6.8.0-36.36 linux-kvm - 6.8.0-36.36 linux-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-generic-64k - 6.8.0-36.36 linux-image-virtual - 6.8.0-36.36 linux-tools-oem-20.04b - 6.8.0-36.36 linux-doc - 6.8.0-36.36 linux-image-generic-64k - 6.8.0-36.36 linux-modules-usbio-generic - 6.8.0-36.36 linux-image-generic - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-image-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-image-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-oem-20.04 - 6.8.0-36.36 linux-tools-oem-20.04c - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic - 6.8.0-36.36 linux-crashdump - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04d - 6.8.0-36.36 linux-modules-iwlwifi-generic - 6.8.0-36.36 linux-modules-extra-6.8.0-36-generic - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-oem-22.04 - 6.8.0-36.36 linux-cloud-tools-6.8.0-36-generic - 6.8.0-36.36 linux-image-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-headers-kvm - 6.8.0-36.36 linux-tools-generic-lpae - 6.8.0-36.36 linux-cloud-tools-generic - 6.8.0-36.36 linux-virtual - 6.8.0-36.36 linux-tools-oem-22.04 - 6.8.0-36.36 linux-laptop-23.10 - 6.8.0-36.36 linux-tools-virtual - 6.8.0-36.36 linux-tools-generic - 6.8.0-36.36 linux-tools-6.8.0-36-generic-64k - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-usbio-6.8.0-36-generic - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-oem-20.04c - 6.8.0-36.36 linux-image-oem-20.04b - 6.8.0-36.36 linux-generic-lpae - 6.8.0-36.36 linux-tools-host - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic-64k - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04 - 6.8.0-36.36 linux-generic - 6.8.0-36.36 linux-image-oem-20.04 - 6.8.0-36.36 linux-oem-20.04d - 6.8.0-36.36 linux-headers-generic-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04c - 6.8.0-36.36 linux-image-oem-22.04 - 6.8.0-36.36 linux-image-uc-generic - 6.8.0-36.36 linux-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-lib-rust-6.8.0-36-generic - 6.8.0-36.36 linux-image-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-6.8.0-36 - 6.8.0-36.36 linux-modules-ipu6-6.8.0-36-generic - 6.8.0-36.36 linux-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-common - 6.8.0-36.36 linux-image-generic-lpae - 6.8.0-36.36 linux-image-6.8.0-36-generic-64k - 6.8.0-36.36 linux-oem-20.04b - 6.8.0-36.36 linux-source - 6.8.0-36.36 linux-image-extra-virtual - 6.8.0-36.36 linux-tools-6.8.0-36-generic - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-modules-ipu6-generic - 6.8.0-36.36 linux-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-image-laptop-23.10 - 6.8.0-36.36 linux-libc-dev - 6.8.0-36.36 linux-tools-6.8.0-36 - 6.8.0-36.36 linux-image-generic-hwe-24.04-edge - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04 - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-22.04 - 6.8.0-36.36 linux-headers-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic - 6.8.0-36.36 linux-cloud-tools-6.8.0-36 - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic-64k - 6.8.0-36.36 linux-tools-laptop-23.10 - 6.8.0-36.36 linux-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-virtual - 6.8.0-36.36 linux-image-kvm - 6.8.0-36.36 linux-source-6.8.0 - 6.8.0-36.36 linux-headers-oem-22.04 - 6.8.0-36.36 linux-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-tools-kvm - 6.8.0-36.36 linux-headers-oem-20.04b - 6.8.0-36.36 linux-headers-oem-20.04c - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic - 6.8.0-36.36 linux-headers-oem-20.04d - 6.8.0-36.36 linux-generic-64k - 6.8.0-36.36 linux-generic-64k-hwe-24.04 - 6.8.0-36.36 No subscription required linux-headers-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-modules-iwlwifi-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-common - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-common - 6.8.0-36.36.1 linux-tools-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-host - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-lowlatency-lib-rust-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-headers-6.8.0-36 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-tools-lowlatency-64k - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-cloud-tools-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-6.8.0-36 - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-6.8.0-36 - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency - 6.8.0-36.36.1 No subscription required High CVE-2024-26924 USN-6864-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-intel - 6.8.0-1006.13 linux-modules-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-intel - 6.8.0-1006.13 linux-intel - 6.8.0-1006.13 linux-intel-cloud-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-intel - 6.8.0-1006.13 linux-intel-headers-6.8.0-1006 - 6.8.0-1006.13 linux-image-intel - 6.8.0-1006.13 linux-modules-extra-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-extra-intel - 6.8.0-1006.13 linux-buildinfo-6.8.0-1006-intel - 6.8.0-1006.13 linux-cloud-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-unsigned-6.8.0-1006-intel - 6.8.0-1006.13 linux-intel-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-iwlwifi-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-6.8.0-1006-intel - 6.8.0-1006.13 No subscription required linux-gcp-headers-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-gcp - 6.8.0-1009.10 linux-tools-gcp - 6.8.0-1009.10 linux-gcp-tools-6.8.0-1009 - 6.8.0-1009.10 linux-modules-6.8.0-1009-gcp - 6.8.0-1009.10 linux-gcp - 6.8.0-1009.10 linux-image-unsigned-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-extra-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-gcp - 6.8.0-1009.10 linux-buildinfo-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-gcp - 6.8.0-1009.10 linux-modules-extra-gcp - 6.8.0-1009.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-oem-24.04a - 6.8.0-1007.7 linux-headers-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-usbio-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-oem-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-uc-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04 - 6.8.0-1007.7 linux-oem-6.8-headers-6.8.0-1007 - 6.8.0-1007.7 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1007.7 linux-image-uc-oem-24.04 - 6.8.0-1007.7 linux-image-oem-24.04a - 6.8.0-1007.7 linux-modules-usbio-oem-24.04 - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04a - 6.8.0-1007.7 linux-headers-oem-24.04a - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-6.8-tools-6.8.0-1007 - 6.8.0-1007.7 linux-modules-usbio-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04a - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-6.8.0-1007-oem - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04a - 6.8.0-1007.7 linux-image-uc-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04 - 6.8.0-1007.7 linux-tools-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04 - 6.8.0-1007.7 linux-headers-oem-24.04 - 6.8.0-1007.7 No subscription required linux-modules-extra-aws - 6.8.0-1010.10 linux-tools-aws - 6.8.0-1010.10 linux-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-headers-6.8.0-1010 - 6.8.0-1010.10 linux-headers-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-tools-6.8.0-1010 - 6.8.0-1010.10 linux-aws-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-6.8.0-1010-aws - 6.8.0-1010.10 linux-headers-aws - 6.8.0-1010.10 linux-image-aws - 6.8.0-1010.10 linux-aws - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-aws - 6.8.0-1010.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-3 -- Linux kernel (GKE) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1005-gke - 6.8.0-1005.8 linux-gke - 6.8.0-1005.8 linux-gke-headers-6.8.0-1005 - 6.8.0-1005.8 linux-gke-tools-6.8.0-1005 - 6.8.0-1005.8 linux-headers-6.8.0-1005-gke - 6.8.0-1005.8 linux-headers-gke - 6.8.0-1005.8 linux-image-6.8.0-1005-gke - 6.8.0-1005.8 linux-image-gke - 6.8.0-1005.8 linux-image-unsigned-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-extra-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-gke - 6.8.0-1005.8 linux-tools-6.8.0-1005-gke - 6.8.0-1005.8 linux-tools-gke - 6.8.0-1005.8 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6875-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Netfilter; (CVE-2024-35901, CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6875-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-image-azure-fde - 6.8.0-1009.9 linux-azure-tools-6.8.0-1009 - 6.8.0-1009.9 linux-azure - 6.8.0-1009.9 linux-azure-headers-6.8.0-1009 - 6.8.0-1009.9 linux-modules-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-azure - 6.8.0-1009.9 linux-azure-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-azure - 6.8.0-1009.9 linux-tools-azure - 6.8.0-1009.9 linux-headers-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-azure - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-extra-azure - 6.8.0-1009.9 linux-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-6.8.0-1009-azure-fde - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-azure - 6.8.0-1009.9 linux-azure-fde - 6.8.0-1009.9 linux-image-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-azure - 6.8.0-1009.9 linux-headers-azure - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-azure - 6.8.0-1009.9 No subscription required High CVE-2024-21823 CVE-2024-26924 CVE-2024-35901 USN-6877-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly performed TLS certificate verification when the LibreOfficeKit library is being used by third-party components. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6877-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.4-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.4-0ubuntu0.24.04.2 python3-access2base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.4-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.4-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.4-0ubuntu0.24.04.2 ure-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.4-0ubuntu0.24.04.2 libridl-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.4-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.4-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.4-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.4-0ubuntu0.24.04.2 libunoil-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.4-0ubuntu0.24.04.2 python3-uno - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.4-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.4-0ubuntu0.24.04.2 libjurt-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.4-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.4-0ubuntu0.24.04.2 ure - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.4-0ubuntu0.24.04.2 libjuh-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.4-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.4-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-5261 USN-6878-1 -- Linux kernel (Oracle) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - PCI iomap interfaces; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-27032, CVE-2024-26868, CVE-2024-26879, CVE-2024-27033, CVE-2024-26943, CVE-2024-27040, CVE-2024-26950, CVE-2023-52650, CVE-2023-52649, CVE-2023-52644, CVE-2024-26899, CVE-2024-27432, CVE-2024-35806, CVE-2024-26871, CVE-2024-35845, CVE-2024-35799, CVE-2024-26945, CVE-2024-35805, CVE-2024-27041, CVE-2024-26860, CVE-2024-26930, CVE-2024-26941, CVE-2024-26960, CVE-2024-27034, CVE-2024-26891, CVE-2024-35793, CVE-2024-26963, CVE-2024-27029, CVE-2024-26890, CVE-2024-27074, CVE-2024-27079, CVE-2024-27053, CVE-2024-27070, CVE-2024-35821, CVE-2024-27067, CVE-2024-27051, CVE-2024-27026, CVE-2024-26961, CVE-2024-27050, CVE-2024-26939, CVE-2024-26897, CVE-2024-26878, CVE-2024-27433, CVE-2024-26885, CVE-2024-35810, CVE-2024-35829, CVE-2024-26965, CVE-2024-26875, CVE-2024-26966, CVE-2024-27078, CVE-2024-35874, CVE-2023-52661, CVE-2024-35794, CVE-2024-35787, CVE-2024-26874, CVE-2024-27054, CVE-2024-26940, CVE-2024-26859, CVE-2024-27044, CVE-2024-26948, CVE-2024-26882, CVE-2023-52653, CVE-2024-27071, CVE-2024-27065, CVE-2024-26877, CVE-2024-26929, CVE-2024-27064, CVE-2024-35803, CVE-2024-27066, CVE-2024-27028, CVE-2024-27072, CVE-2024-26876, CVE-2024-27039, CVE-2024-27435, CVE-2024-27434, CVE-2024-26812, CVE-2024-27030, CVE-2024-26816, CVE-2024-26873, CVE-2024-35808, CVE-2024-27389, CVE-2024-27075, CVE-2024-27038, CVE-2024-35828, CVE-2024-26946, CVE-2024-26655, CVE-2023-52662, CVE-2024-27077, CVE-2024-27076, CVE-2024-35795, CVE-2024-26933, CVE-2024-35789, CVE-2024-26972, CVE-2023-52663, CVE-2024-27031, CVE-2024-27069, CVE-2024-26813, CVE-2023-52659, CVE-2024-26862, CVE-2024-26962, CVE-2024-26654, CVE-2024-26815, CVE-2024-26978, CVE-2024-26976, CVE-2024-26893, CVE-2024-35809, CVE-2024-27027, CVE-2024-26864, CVE-2024-27048, CVE-2024-27046, CVE-2024-26869, CVE-2024-35827, CVE-2024-26951, CVE-2024-26942, CVE-2024-26870, CVE-2024-27437, CVE-2024-26931, CVE-2024-27036, CVE-2022-48669, CVE-2024-26898, CVE-2024-26970, CVE-2024-26886, CVE-2024-26944, CVE-2024-26865, CVE-2024-26896, CVE-2024-26895, CVE-2024-26947, CVE-2024-26880, CVE-2024-35811, CVE-2024-26975, CVE-2024-27391, CVE-2024-35796, CVE-2024-27043, CVE-2024-26949, CVE-2024-26653, CVE-2024-35814, CVE-2024-26964, CVE-2023-52652, CVE-2024-27047, CVE-2024-35830, CVE-2024-26900, CVE-2024-26810, CVE-2024-26956, CVE-2024-35817, CVE-2024-26887, CVE-2024-26809, CVE-2024-27045, CVE-2024-26656, CVE-2024-26971, CVE-2024-26866, CVE-2024-26861, CVE-2024-26968, CVE-2024-26881, CVE-2024-27063, CVE-2024-35807, CVE-2024-35797, CVE-2024-35822, CVE-2024-35813, CVE-2024-27073, CVE-2024-26954, CVE-2024-26888, CVE-2024-26955, CVE-2024-26894, CVE-2024-35844, CVE-2024-26958, CVE-2024-26952, CVE-2024-35798, CVE-2024-26969, CVE-2024-26967, CVE-2024-35800, CVE-2024-35819, CVE-2024-26937, CVE-2024-26927, CVE-2024-26883, CVE-2024-26934, CVE-2024-27392, CVE-2024-27068, CVE-2024-26889, CVE-2024-26892, CVE-2024-27390, CVE-2024-26657, CVE-2024-27388, CVE-2024-27049, CVE-2024-26935, CVE-2024-35831, CVE-2024-26884, CVE-2024-26938, CVE-2024-27037, CVE-2024-26977, CVE-2024-26953, CVE-2024-26973, CVE-2024-26932, CVE-2024-26901, CVE-2024-35843, CVE-2024-26872, CVE-2024-26959, CVE-2024-27035, CVE-2024-35826, CVE-2024-27436, CVE-2024-26651, CVE-2024-26957, CVE-2024-26863, CVE-2024-27042, CVE-2024-26814, CVE-2023-52647, CVE-2024-27080, CVE-2024-27052, CVE-2024-27058, CVE-2024-35801, CVE-2023-52648) Update Instructions: Run `sudo pro fix USN-6878-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-extra-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-oracle - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle - 6.8.0-1006.6 linux-image-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle-64k - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-64k - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle-64k - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle - 6.8.0-1006.6 linux-modules-extra-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-oracle - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle - 6.8.0-1006.6 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31620, CVE-2023-31622, CVE-2023-31624, CVE-2023-31626, CVE-2023-31627, CVE-2023-31629, CVE-2023-31630, CVE-2023-31631, CVE-2023-48951) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-48945, CVE-2023-48946, CVE-2023-48947, CVE-2023-48950) Update Instructions: Run `sudo pro fix USN-6879-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31620 CVE-2023-31622 CVE-2023-31624 CVE-2023-31626 CVE-2023-31627 CVE-2023-31629 CVE-2023-31630 CVE-2023-31631 CVE-2023-48945 CVE-2023-48946 CVE-2023-48947 CVE-2023-48950 CVE-2023-48951 USN-6882-1 -- Cinder vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.2 cinder-backup - 2:24.0.0-0ubuntu1.2 cinder-common - 2:24.0.0-0ubuntu1.2 cinder-scheduler - 2:24.0.0-0ubuntu1.2 cinder-volume - 2:24.0.0-0ubuntu1.2 python3-cinder - 2:24.0.0-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6882-2 -- Cinder regression Ubuntu 24.04 LTS USN-6882-1 fixed vulnerabilities in Cinder. The update caused a regression in certain environments due to incorrect privilege handling. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.3 cinder-backup - 2:24.0.0-0ubuntu1.3 cinder-common - 2:24.0.0-0ubuntu1.3 cinder-scheduler - 2:24.0.0-0ubuntu1.3 cinder-volume - 2:24.0.0-0ubuntu1.3 python3-cinder - 2:24.0.0-0ubuntu1.3 No subscription required Medium CVE-2022-47951 CVE-2024-32498 USN-6883-1 -- OpenStack Glance vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Glance incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6883-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glance - 2:28.0.1-0ubuntu1.2 glance-api - 2:28.0.1-0ubuntu1.2 glance-common - 2:28.0.1-0ubuntu1.2 python-glance-doc - 2:28.0.1-0ubuntu1.2 python3-glance - 2:28.0.1-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6884-1 -- Nova vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Nova incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6884-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.3 nova-api - 3:29.0.1-0ubuntu1.3 nova-api-metadata - 3:29.0.1-0ubuntu1.3 nova-api-os-compute - 3:29.0.1-0ubuntu1.3 nova-api-os-volume - 3:29.0.1-0ubuntu1.3 nova-cells - 3:29.0.1-0ubuntu1.3 nova-common - 3:29.0.1-0ubuntu1.3 nova-compute - 3:29.0.1-0ubuntu1.3 nova-compute-ironic - 3:29.0.1-0ubuntu1.3 nova-compute-kvm - 3:29.0.1-0ubuntu1.3 nova-compute-libvirt - 3:29.0.1-0ubuntu1.3 nova-compute-lxc - 3:29.0.1-0ubuntu1.3 nova-compute-qemu - 3:29.0.1-0ubuntu1.3 nova-compute-vmware - 3:29.0.1-0ubuntu1.3 nova-compute-xen - 3:29.0.1-0ubuntu1.3 nova-conductor - 3:29.0.1-0ubuntu1.3 nova-doc - 3:29.0.1-0ubuntu1.3 nova-novncproxy - 3:29.0.1-0ubuntu1.3 nova-scheduler - 3:29.0.1-0ubuntu1.3 nova-serialproxy - 3:29.0.1-0ubuntu1.3 nova-spiceproxy - 3:29.0.1-0ubuntu1.3 nova-volume - 3:29.0.1-0ubuntu1.3 python3-nova - 3:29.0.1-0ubuntu1.3 No subscription required Medium CVE-2024-32498 USN-6885-1 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.2 apache2-bin - 2.4.58-1ubuntu8.2 apache2-data - 2.4.58-1ubuntu8.2 apache2-dev - 2.4.58-1ubuntu8.2 apache2-doc - 2.4.58-1ubuntu8.2 apache2-ssl-dev - 2.4.58-1ubuntu8.2 apache2-suexec-custom - 2.4.58-1ubuntu8.2 apache2-suexec-pristine - 2.4.58-1ubuntu8.2 apache2-utils - 2.4.58-1ubuntu8.2 libapache2-mod-md - 2.4.58-1ubuntu8.2 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.2 No subscription required High CVE-2024-36387 CVE-2024-38473 CVE-2024-38474 CVE-2024-38475 CVE-2024-38476 CVE-2024-38477 CVE-2024-39573 CVE-2024-39884 USN-6885-2 -- Apache HTTP Server regression Ubuntu 24.04 LTS USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.3 apache2-bin - 2.4.58-1ubuntu8.3 apache2-data - 2.4.58-1ubuntu8.3 apache2-dev - 2.4.58-1ubuntu8.3 apache2-doc - 2.4.58-1ubuntu8.3 apache2-ssl-dev - 2.4.58-1ubuntu8.3 apache2-suexec-custom - 2.4.58-1ubuntu8.3 apache2-suexec-pristine - 2.4.58-1ubuntu8.3 apache2-utils - 2.4.58-1ubuntu8.3 libapache2-mod-md - 2.4.58-1ubuntu8.3 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.3 No subscription required None https://launchpad.net/bugs/2072648 USN-6885-4 -- Apache HTTP Server regression Ubuntu 24.04 LTS USN-6885-1 fixed a vulnerability in Apache. The patch for CVE-2024-38474 was incomplete and caused regressions. This update provides the fix for that issue. Original advisory details: Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474) Update Instructions: Run `sudo pro fix USN-6885-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.6 apache2-bin - 2.4.58-1ubuntu8.6 apache2-data - 2.4.58-1ubuntu8.6 apache2-dev - 2.4.58-1ubuntu8.6 apache2-doc - 2.4.58-1ubuntu8.6 apache2-ssl-dev - 2.4.58-1ubuntu8.6 apache2-suexec-custom - 2.4.58-1ubuntu8.6 apache2-suexec-pristine - 2.4.58-1ubuntu8.6 apache2-utils - 2.4.58-1ubuntu8.6 libapache2-mod-md - 2.4.58-1ubuntu8.6 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.6 No subscription required None https://launchpad.net/bugs/2103723 USN-6886-1 -- Go vulnerabilities Ubuntu 24.04 LTS It was discovered that the Go net/http module did not properly handle the requests when request\'s headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45288) It was discovered that the Go net/http module did not properly validate the subdomain match or exact match of the initial domain. An attacker could possibly use this issue to read sensitive information. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45289) It was discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45290) It was discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24783) It was discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24784) It was discovered that the Go html/template module did not validate errors returned from MarshalJSON methods. An attacker could possibly use this issue to inject arbitrary code into the Go template. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24785) It was discovered that the Go net module did not properly validate the DNS message in response to a query. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.22. (CVE-2024-24788) It was discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) It was discovered that the Go net/netip module did not work as expected for IPv4-mapped IPv6 addresses in various Is methods. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24790) Update Instructions: Run `sudo pro fix USN-6886-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.21 - 1.21.9-1ubuntu0.1 golang-1.21-doc - 1.21.9-1ubuntu0.1 golang-1.21-go - 1.21.9-1ubuntu0.1 golang-1.21-src - 1.21.9-1ubuntu0.1 No subscription required golang-1.22 - 1.22.2-2ubuntu0.1 golang-1.22-doc - 1.22.2-2ubuntu0.1 golang-1.22-go - 1.22.2-2ubuntu0.1 golang-1.22-src - 1.22.2-2ubuntu0.1 No subscription required Medium CVE-2023-45288 CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785 CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 USN-6887-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker could possibly use this issue to determine timing information about keystrokes. Update Instructions: Run `sudo pro fix USN-6887-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.4 openssh-server - 1:9.6p1-3ubuntu13.4 openssh-sftp-server - 1:9.6p1-3ubuntu13.4 openssh-tests - 1:9.6p1-3ubuntu13.4 ssh - 1:9.6p1-3ubuntu13.4 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.4 No subscription required Medium CVE-2024-39894 USN-6888-1 -- Django vulnerabilities Ubuntu 24.04 LTS Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary directories. (CVE-2024-39330) It was discovered that Django incorrectly handled certain long strings that included a specific set of characters. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-39614) Update Instructions: Run `sudo pro fix USN-6888-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.1 python3-django - 3:4.2.11-1ubuntu1.1 No subscription required Medium CVE-2024-38875 CVE-2024-39329 CVE-2024-39330 CVE-2024-39614 USN-6889-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-30105) Radek Zikmund discovered that .NET did not properly manage memory. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-35264) It was discovered that .NET did not properly parse X.509 Content and ObjectIdentifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38095) Update Instructions: Run `sudo pro fix USN-6889-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.107-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.107-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.107-8.0.7-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30105 CVE-2024-35264 CVE-2024-38095 USN-6893-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008, CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946, CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942, CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934, CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976, CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929, CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986, CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965, CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892, CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865, CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027, CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875, CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903, CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025, CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864, CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968, CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019, CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916, CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002, CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011, CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910, CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010, CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894, CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007, CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960, CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001, CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979, CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926, CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920, CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911, CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982, CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919, CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914, CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939, CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811, CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945, CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921, CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893, CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954, CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014, CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927, CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017, CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869, CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974) Update Instructions: Run `sudo pro fix USN-6893-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-intel - 6.8.0-1007.14 linux-cloud-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-intel - 6.8.0-1007.14 linux-image-6.8.0-1007-intel - 6.8.0-1007.14 linux-image-intel - 6.8.0-1007.14 linux-image-unsigned-6.8.0-1007-intel - 6.8.0-1007.14 linux-intel - 6.8.0-1007.14 linux-intel-cloud-tools-6.8.0-1007 - 6.8.0-1007.14 linux-intel-headers-6.8.0-1007 - 6.8.0-1007.14 linux-intel-tools-6.8.0-1007 - 6.8.0-1007.14 linux-modules-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-intel - 6.8.0-1007.14 linux-modules-iwlwifi-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-iwlwifi-intel - 6.8.0-1007.14 linux-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-tools-intel - 6.8.0-1007.14 No subscription required linux-buildinfo-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-raspi - 6.8.0-1007.7 linux-image-6.8.0-1007-raspi - 6.8.0-1007.7 linux-image-raspi - 6.8.0-1007.7 linux-modules-6.8.0-1007-raspi - 6.8.0-1007.7 linux-raspi - 6.8.0-1007.7 linux-raspi-headers-6.8.0-1007 - 6.8.0-1007.7 linux-raspi-tools-6.8.0-1007 - 6.8.0-1007.7 linux-tools-6.8.0-1007-raspi - 6.8.0-1007.7 linux-tools-raspi - 6.8.0-1007.7 No subscription required linux-buildinfo-6.8.0-1008-ibm - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-6.8.0-1008-ibm - 6.8.0-1008.8 linux-headers-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-ibm - 6.8.0-1008.8 linux-headers-ibm-classic - 6.8.0-1008.8 linux-headers-ibm-lts-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04a - 6.8.0-1008.8 linux-ibm - 6.8.0-1008.8 linux-ibm-classic - 6.8.0-1008.8 linux-ibm-cloud-tools-common - 6.8.0-1008.8 linux-ibm-headers-6.8.0-1008 - 6.8.0-1008.8 linux-ibm-lts-24.04 - 6.8.0-1008.8 linux-ibm-source-6.8.0 - 6.8.0-1008.8 linux-ibm-tools-6.8.0-1008 - 6.8.0-1008.8 linux-image-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-ibm - 6.8.0-1008.8 linux-image-ibm-classic - 6.8.0-1008.8 linux-image-ibm-lts-24.04 - 6.8.0-1008.8 linux-image-oem-24.04 - 6.8.0-1008.8 linux-image-oem-24.04a - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-uc-oem-24.04 - 6.8.0-1008.8 linux-image-uc-oem-24.04a - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-ipu6-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04 - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04a - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-iwlwifi-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-classic - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1008.8 linux-modules-usbio-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-usbio-oem-24.04 - 6.8.0-1008.8 linux-modules-usbio-oem-24.04a - 6.8.0-1008.8 linux-oem-24.04 - 6.8.0-1008.8 linux-oem-24.04a - 6.8.0-1008.8 linux-oem-6.8-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oem-6.8-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-ibm - 6.8.0-1008.8 linux-tools-6.8.0-1008-oem - 6.8.0-1008.8 linux-tools-ibm - 6.8.0-1008.8 linux-tools-ibm-classic - 6.8.0-1008.8 linux-tools-ibm-lts-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04a - 6.8.0-1008.8 No subscription required linux-azure - 6.8.0-1010.10 linux-azure-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-azure-fde - 6.8.0-1010.10 linux-azure-headers-6.8.0-1010 - 6.8.0-1010.10 linux-azure-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-azure - 6.8.0-1010.10 linux-headers-6.8.0-1010-azure - 6.8.0-1010.10 linux-headers-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure-fde - 6.8.0-1010.10 linux-image-azure - 6.8.0-1010.10 linux-image-azure-fde - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-azure - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-iwlwifi-azure - 6.8.0-1010.10 linux-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-tools-azure - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1010-gcp - 6.8.0-1010.11 linux-gcp - 6.8.0-1010.11 linux-gcp-headers-6.8.0-1010 - 6.8.0-1010.11 linux-gcp-tools-6.8.0-1010 - 6.8.0-1010.11 linux-headers-6.8.0-1010-gcp - 6.8.0-1010.11 linux-headers-gcp - 6.8.0-1010.11 linux-image-6.8.0-1010-gcp - 6.8.0-1010.11 linux-image-gcp - 6.8.0-1010.11 linux-image-unsigned-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-gcp - 6.8.0-1010.11 linux-tools-6.8.0-1010-gcp - 6.8.0-1010.11 linux-tools-gcp - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-38-generic - 6.8.0-38.38 linux-buildinfo-6.8.0-38-generic-64k - 6.8.0-38.38 linux-cloud-tools-6.8.0-38 - 6.8.0-38.38 linux-cloud-tools-6.8.0-38-generic - 6.8.0-38.38 linux-cloud-tools-common - 6.8.0-38.38 linux-cloud-tools-generic - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-cloud-tools-virtual - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-crashdump - 6.8.0-38.38 linux-doc - 6.8.0-38.38 linux-generic - 6.8.0-38.38 linux-generic-64k - 6.8.0-38.38 linux-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-generic-hwe-24.04 - 6.8.0-38.38 linux-generic-hwe-24.04-edge - 6.8.0-38.38 linux-generic-lpae - 6.8.0-38.38 linux-headers-6.8.0-38 - 6.8.0-38.38 linux-headers-6.8.0-38-generic - 6.8.0-38.38 linux-headers-6.8.0-38-generic-64k - 6.8.0-38.38 linux-headers-generic - 6.8.0-38.38 linux-headers-generic-64k - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-lpae - 6.8.0-38.38 linux-headers-kvm - 6.8.0-38.38 linux-headers-laptop-23.10 - 6.8.0-38.38 linux-headers-oem-20.04 - 6.8.0-38.38 linux-headers-oem-20.04b - 6.8.0-38.38 linux-headers-oem-20.04c - 6.8.0-38.38 linux-headers-oem-20.04d - 6.8.0-38.38 linux-headers-oem-22.04 - 6.8.0-38.38 linux-headers-virtual - 6.8.0-38.38 linux-headers-virtual-hwe-24.04 - 6.8.0-38.38 linux-headers-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-6.8.0-38-generic - 6.8.0-38.38 linux-image-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-extra-virtual - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic - 6.8.0-38.38 linux-image-generic-64k - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-hwe-24.04 - 6.8.0-38.38 linux-image-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-lpae - 6.8.0-38.38 linux-image-kvm - 6.8.0-38.38 linux-image-laptop-23.10 - 6.8.0-38.38 linux-image-oem-20.04 - 6.8.0-38.38 linux-image-oem-20.04b - 6.8.0-38.38 linux-image-oem-20.04c - 6.8.0-38.38 linux-image-oem-20.04d - 6.8.0-38.38 linux-image-oem-22.04 - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-uc-generic - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04 - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-virtual - 6.8.0-38.38 linux-image-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-kvm - 6.8.0-38.38 linux-laptop-23.10 - 6.8.0-38.38 linux-lib-rust-6.8.0-38-generic - 6.8.0-38.38 linux-libc-dev - 6.8.0-38.38 linux-modules-6.8.0-38-generic - 6.8.0-38.38 linux-modules-6.8.0-38-generic-64k - 6.8.0-38.38 linux-modules-extra-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-generic - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-6.8.0-38-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04 - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04d - 6.8.0-38.38 linux-modules-iwlwifi-oem-22.04 - 6.8.0-38.38 linux-modules-usbio-6.8.0-38-generic - 6.8.0-38.38 linux-modules-usbio-generic - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-38.38 linux-oem-20.04 - 6.8.0-38.38 linux-oem-20.04b - 6.8.0-38.38 linux-oem-20.04c - 6.8.0-38.38 linux-oem-20.04d - 6.8.0-38.38 linux-oem-22.04 - 6.8.0-38.38 linux-source - 6.8.0-38.38 linux-source-6.8.0 - 6.8.0-38.38 linux-tools-6.8.0-38 - 6.8.0-38.38 linux-tools-6.8.0-38-generic - 6.8.0-38.38 linux-tools-6.8.0-38-generic-64k - 6.8.0-38.38 linux-tools-common - 6.8.0-38.38 linux-tools-generic - 6.8.0-38.38 linux-tools-generic-64k - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-lpae - 6.8.0-38.38 linux-tools-host - 6.8.0-38.38 linux-tools-kvm - 6.8.0-38.38 linux-tools-laptop-23.10 - 6.8.0-38.38 linux-tools-oem-20.04 - 6.8.0-38.38 linux-tools-oem-20.04b - 6.8.0-38.38 linux-tools-oem-20.04c - 6.8.0-38.38 linux-tools-oem-20.04d - 6.8.0-38.38 linux-tools-oem-22.04 - 6.8.0-38.38 linux-tools-virtual - 6.8.0-38.38 linux-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-virtual - 6.8.0-38.38 linux-virtual-hwe-24.04 - 6.8.0-38.38 linux-virtual-hwe-24.04-edge - 6.8.0-38.38 No subscription required linux-buildinfo-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-buildinfo-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-cloud-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency - 6.8.0-38.38.1 linux-headers-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency - 6.8.0-38.38.1 linux-image-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency - 6.8.0-38.38.1 linux-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-common - 6.8.0-38.38.1 linux-lowlatency-headers-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-lib-rust-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-lowlatency-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-tools-common - 6.8.0-38.38.1 linux-lowlatency-tools-host - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-modules-iwlwifi-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency - 6.8.0-38.38.1 linux-tools-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961, CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939, CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896, CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015, CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922, CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007, CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914, CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915, CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867, CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022, CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024, CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912, CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866, CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936, CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018, CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870, CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878, CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014, CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983, CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008, CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973, CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026, CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953, CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971, CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937, CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981, CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952, CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880, CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871, CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017) Update Instructions: Run `sudo pro fix USN-6893-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gke - 6.8.0-1006.9 linux-gke - 6.8.0-1006.9 linux-gke-headers-6.8.0-1006 - 6.8.0-1006.9 linux-gke-tools-6.8.0-1006 - 6.8.0-1006.9 linux-headers-6.8.0-1006-gke - 6.8.0-1006.9 linux-headers-gke - 6.8.0-1006.9 linux-image-6.8.0-1006-gke - 6.8.0-1006.9 linux-image-gke - 6.8.0-1006.9 linux-image-unsigned-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-extra-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-gke - 6.8.0-1006.9 linux-tools-6.8.0-1006-gke - 6.8.0-1006.9 linux-tools-gke - 6.8.0-1006.9 No subscription required linux-buildinfo-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-cloud-tools-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-headers-nvidia - 6.8.0-1009.9 linux-headers-nvidia-64k - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-nvidia - 6.8.0-1009.9 linux-image-nvidia-64k - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1009.9 linux-nvidia - 6.8.0-1009.9 linux-nvidia-64k - 6.8.0-1009.9 linux-nvidia-headers-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-host - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-tools-nvidia - 6.8.0-1009.9 linux-tools-nvidia-64k - 6.8.0-1009.9 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966) Update Instructions: Run `sudo pro fix USN-6893-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1011.12 linux-aws-cloud-tools-6.8.0-1011 - 6.8.0-1011.12 linux-aws-headers-6.8.0-1011 - 6.8.0-1011.12 linux-aws-tools-6.8.0-1011 - 6.8.0-1011.12 linux-buildinfo-6.8.0-1011-aws - 6.8.0-1011.12 linux-cloud-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-aws - 6.8.0-1011.12 linux-image-6.8.0-1011-aws - 6.8.0-1011.12 linux-image-aws - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-aws - 6.8.0-1011.12 linux-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-tools-aws - 6.8.0-1011.12 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6897-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly handled certain long PDF filter names. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506) It was discovered that Ghostscript incorrectly handled certain API parameters. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29507) It was discovered that Ghostscript incorrectly handled certain BaseFont names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-29508) It was discovered that Ghostscript incorrectly handled certain PDF passwords that contained NULL bytes. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29509) It was discovered that Ghostscript incorrectly handled certain certain file paths when doing OCR. An attacker could use this issue to read arbitrary files and write error messages to arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511) Update Instructions: Run `sudo pro fix USN-6897-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.3 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.3 libgs-common - 10.02.1~dfsg1-0ubuntu7.3 libgs-dev - 10.02.1~dfsg1-0ubuntu7.3 libgs10 - 10.02.1~dfsg1-0ubuntu7.3 libgs10-common - 10.02.1~dfsg1-0ubuntu7.3 No subscription required Medium CVE-2024-29506 CVE-2024-29507 CVE-2024-29508 CVE-2024-29509 CVE-2024-29511 USN-6899-1 -- GTK vulnerability Ubuntu 24.04 LTS It was discovered that GTK would attempt to load modules from the current directory, contrary to expectations. If users started GTK applications from shared directories, a local attacker could use this issue to execute arbitrary code, and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6899-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gtk-2.0 - 2.24.33-4ubuntu1.1 gtk2-engines-pixbuf - 2.24.33-4ubuntu1.1 libgail-common - 2.24.33-4ubuntu1.1 libgail-dev - 2.24.33-4ubuntu1.1 libgail-doc - 2.24.33-4ubuntu1.1 libgail18t64 - 2.24.33-4ubuntu1.1 libgtk2.0-0t64 - 2.24.33-4ubuntu1.1 libgtk2.0-bin - 2.24.33-4ubuntu1.1 libgtk2.0-common - 2.24.33-4ubuntu1.1 libgtk2.0-dev - 2.24.33-4ubuntu1.1 libgtk2.0-doc - 2.24.33-4ubuntu1.1 No subscription required gir1.2-gtk-3.0 - 3.24.41-4ubuntu1.1 gtk-3-examples - 3.24.41-4ubuntu1.1 gtk-update-icon-cache - 3.24.41-4ubuntu1.1 libgail-3-0t64 - 3.24.41-4ubuntu1.1 libgail-3-dev - 3.24.41-4ubuntu1.1 libgail-3-doc - 3.24.41-4ubuntu1.1 libgtk-3-0t64 - 3.24.41-4ubuntu1.1 libgtk-3-bin - 3.24.41-4ubuntu1.1 libgtk-3-common - 3.24.41-4ubuntu1.1 libgtk-3-dev - 3.24.41-4ubuntu1.1 libgtk-3-doc - 3.24.41-4ubuntu1.1 No subscription required Medium CVE-2024-6655 USN-6902-1 -- Apache HTTP Server vulnerability Ubuntu 24.04 LTS It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update Instructions: Run `sudo pro fix USN-6902-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.4 apache2-bin - 2.4.58-1ubuntu8.4 apache2-data - 2.4.58-1ubuntu8.4 apache2-dev - 2.4.58-1ubuntu8.4 apache2-doc - 2.4.58-1ubuntu8.4 apache2-ssl-dev - 2.4.58-1ubuntu8.4 apache2-suexec-custom - 2.4.58-1ubuntu8.4 apache2-suexec-pristine - 2.4.58-1ubuntu8.4 apache2-utils - 2.4.58-1ubuntu8.4 libapache2-mod-md - 2.4.58-1ubuntu8.4 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.4 No subscription required Medium CVE-2024-40725 USN-6904-1 -- PyMongo vulnerability Ubuntu 24.04 LTS It was discovered that PyMongo incorrectly handled certain BSON. An attacker could possibly use this issue to read sensitive information or cause a crash. Update Instructions: Run `sudo pro fix USN-6904-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pymongo-doc - 3.11.0-1ubuntu0.24.04.1 python3-bson - 3.11.0-1ubuntu0.24.04.1 python3-bson-ext - 3.11.0-1ubuntu0.24.04.1 python3-gridfs - 3.11.0-1ubuntu0.24.04.1 python3-pymongo - 3.11.0-1ubuntu0.24.04.1 python3-pymongo-ext - 3.11.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5629 USN-6906-1 -- python-zipp vulnerability Ubuntu 24.04 LTS It was discovered that python-zipp did not properly handle the zip files with malformed names. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6906-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-zipp - 1.0.0-6ubuntu0.1 No subscription required Medium CVE-2024-5569 USN-6907-1 -- Squid vulnerability Ubuntu 24.04 LTS Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue to cause a memory corruption error, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6907-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.6-1ubuntu5.1 squid-cgi - 6.6-1ubuntu5.1 squid-common - 6.6-1ubuntu5.1 squid-openssl - 6.6-1ubuntu5.1 squid-purge - 6.6-1ubuntu5.1 squidclient - 6.6-1ubuntu5.1 No subscription required Medium CVE-2024-37894 USN-6909-1 -- Bind vulnerabilities Ubuntu 24.04 LTS It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind to become unstable, resulting in a denial of service. (CVE-2024-0760) Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very large number of RRs existing at the same time. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1737) It was discovered that Bind incorrectly handled a large number of SIG(0) signed requests. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1975) Daniel Stränger discovered that Bind incorrectly handled serving both stable cache data and authoritative zone content. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2024-4076) On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918 Update Instructions: Run `sudo pro fix USN-6909-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.28-0ubuntu0.24.04.1 bind9-dev - 1:9.18.28-0ubuntu0.24.04.1 bind9-dnsutils - 1:9.18.28-0ubuntu0.24.04.1 bind9-doc - 1:9.18.28-0ubuntu0.24.04.1 bind9-host - 1:9.18.28-0ubuntu0.24.04.1 bind9-libs - 1:9.18.28-0ubuntu0.24.04.1 bind9-utils - 1:9.18.28-0ubuntu0.24.04.1 bind9utils - 1:9.18.28-0ubuntu0.24.04.1 dnsutils - 1:9.18.28-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-0760 CVE-2024-1737 CVE-2024-1975 CVE-2024-4076 USN-6911-1 -- Nova vulnerability Ubuntu 24.04 LTS Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6911-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.4 nova-api - 3:29.0.1-0ubuntu1.4 nova-api-metadata - 3:29.0.1-0ubuntu1.4 nova-api-os-compute - 3:29.0.1-0ubuntu1.4 nova-api-os-volume - 3:29.0.1-0ubuntu1.4 nova-cells - 3:29.0.1-0ubuntu1.4 nova-common - 3:29.0.1-0ubuntu1.4 nova-compute - 3:29.0.1-0ubuntu1.4 nova-compute-ironic - 3:29.0.1-0ubuntu1.4 nova-compute-kvm - 3:29.0.1-0ubuntu1.4 nova-compute-libvirt - 3:29.0.1-0ubuntu1.4 nova-compute-lxc - 3:29.0.1-0ubuntu1.4 nova-compute-qemu - 3:29.0.1-0ubuntu1.4 nova-compute-vmware - 3:29.0.1-0ubuntu1.4 nova-compute-xen - 3:29.0.1-0ubuntu1.4 nova-conductor - 3:29.0.1-0ubuntu1.4 nova-doc - 3:29.0.1-0ubuntu1.4 nova-novncproxy - 3:29.0.1-0ubuntu1.4 nova-scheduler - 3:29.0.1-0ubuntu1.4 nova-serialproxy - 3:29.0.1-0ubuntu1.4 nova-spiceproxy - 3:29.0.1-0ubuntu1.4 nova-volume - 3:29.0.1-0ubuntu1.4 python3-nova - 3:29.0.1-0ubuntu1.4 No subscription required Medium CVE-2024-40767 USN-6912-1 -- provd vulnerability Ubuntu 24.04 LTS James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. Update Instructions: Run `sudo pro fix USN-6912-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: provd - 0.1.2+24.04 No subscription required Medium CVE-2024-6714 https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574 USN-6915-1 -- poppler vulnerability Ubuntu 24.04 LTS It was discovered that poppler incorrectly handled certain malformed PDF. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6915-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.1 libpoppler-cpp-dev - 24.02.0-1ubuntu9.1 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.1 libpoppler-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-doc - 24.02.0-1ubuntu9.1 libpoppler-glib8t64 - 24.02.0-1ubuntu9.1 libpoppler-private-dev - 24.02.0-1ubuntu9.1 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.1 libpoppler-qt5-dev - 24.02.0-1ubuntu9.1 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.1 libpoppler-qt6-dev - 24.02.0-1ubuntu9.1 libpoppler134 - 24.02.0-1ubuntu9.1 poppler-utils - 24.02.0-1ubuntu9.1 No subscription required Low CVE-2024-6239 USN-6918-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, CVE-2024-35894, CVE-2024-26983, CVE-2024-35966, CVE-2024-35967, CVE-2024-35945, CVE-2024-27003, CVE-2024-35939, CVE-2024-35861, CVE-2024-26985, CVE-2024-27015, CVE-2024-35982, CVE-2024-35912, CVE-2024-35979, CVE-2024-35879, CVE-2024-26982, CVE-2024-35891, CVE-2024-35925, CVE-2024-35870, CVE-2024-27021, CVE-2024-35866, CVE-2024-27014, CVE-2024-27001, CVE-2024-27004, CVE-2024-35953, CVE-2024-36021, CVE-2024-35931, CVE-2024-27007, CVE-2024-35922, CVE-2024-35872, CVE-2024-35926, CVE-2024-27016, CVE-2024-26984, CVE-2024-35919, CVE-2024-35911, CVE-2024-26923, CVE-2024-35929, CVE-2024-35887, CVE-2024-35893, CVE-2024-35898, CVE-2024-35930, CVE-2024-35934, CVE-2024-35916, CVE-2024-35877, CVE-2024-26926, CVE-2024-35974, CVE-2024-36018, CVE-2024-27002, CVE-2024-35975, CVE-2024-35864, CVE-2024-35958, CVE-2024-35944, CVE-2024-35985, CVE-2024-35940, CVE-2024-35900, CVE-2024-27018, CVE-2024-26936, CVE-2024-36024, CVE-2024-26998, CVE-2024-35954, CVE-2024-35878, CVE-2024-26928, CVE-2024-35952, CVE-2024-36020, CVE-2024-26986, CVE-2024-35950, CVE-2024-35957, CVE-2024-35909, CVE-2024-27005, CVE-2024-35978, CVE-2024-35875, CVE-2024-35943, CVE-2024-35970, CVE-2024-35863, CVE-2024-26993, CVE-2024-35865, CVE-2024-26995, CVE-2024-35888, CVE-2024-35899, CVE-2024-35868, CVE-2023-52699, CVE-2024-26994, CVE-2024-26817, CVE-2024-35902, CVE-2024-35977, CVE-2024-35961, CVE-2024-36025, CVE-2024-35936, CVE-2024-35913, CVE-2024-27017, CVE-2024-35889, CVE-2024-35972, CVE-2024-35901, CVE-2024-26921, CVE-2024-26924, CVE-2024-35951, CVE-2024-35860, CVE-2024-35907, CVE-2024-35910, CVE-2024-36022, CVE-2024-27019, CVE-2024-27009, CVE-2024-26981, CVE-2024-35973, CVE-2024-35965, CVE-2024-36019, CVE-2024-35871, CVE-2024-27008, CVE-2024-26811, CVE-2024-35908, CVE-2024-35921, CVE-2024-35942, CVE-2024-35946, CVE-2024-35924, CVE-2024-27011, CVE-2024-35960, CVE-2024-27006, CVE-2024-35937, CVE-2024-35932) Update Instructions: Run `sudo pro fix USN-6918-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-oracle - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-oracle - 6.8.0-1008.8 linux-headers-oracle-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-image-oracle - 6.8.0-1008.8 linux-image-oracle-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-iwlwifi-oracle - 6.8.0-1008.8 linux-oracle - 6.8.0-1008.8 linux-oracle-64k - 6.8.0-1008.8 linux-oracle-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oracle-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-tools-oracle - 6.8.0-1008.8 linux-tools-oracle-64k - 6.8.0-1008.8 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6921-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984, CVE-2024-36008, CVE-2024-36016) Update Instructions: Run `sudo pro fix USN-6921-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gke - 6.8.0-1007.10 linux-gke - 6.8.0-1007.10 linux-gke-headers-6.8.0-1007 - 6.8.0-1007.10 linux-gke-tools-6.8.0-1007 - 6.8.0-1007.10 linux-headers-6.8.0-1007-gke - 6.8.0-1007.10 linux-headers-gke - 6.8.0-1007.10 linux-image-6.8.0-1007-gke - 6.8.0-1007.10 linux-image-gke - 6.8.0-1007.10 linux-image-unsigned-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-extra-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-gke - 6.8.0-1007.10 linux-tools-6.8.0-1007-gke - 6.8.0-1007.10 linux-tools-gke - 6.8.0-1007.10 No subscription required linux-buildinfo-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-raspi - 6.8.0-1008.8 linux-image-6.8.0-1008-raspi - 6.8.0-1008.8 linux-image-raspi - 6.8.0-1008.8 linux-modules-6.8.0-1008-raspi - 6.8.0-1008.8 linux-raspi - 6.8.0-1008.8 linux-raspi-headers-6.8.0-1008 - 6.8.0-1008.8 linux-raspi-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-raspi - 6.8.0-1008.8 linux-tools-raspi - 6.8.0-1008.8 No subscription required linux-buildinfo-6.8.0-1009-ibm - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-6.8.0-1009-ibm - 6.8.0-1009.9 linux-headers-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-ibm - 6.8.0-1009.9 linux-headers-ibm-classic - 6.8.0-1009.9 linux-headers-ibm-lts-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04a - 6.8.0-1009.9 linux-ibm - 6.8.0-1009.9 linux-ibm-classic - 6.8.0-1009.9 linux-ibm-cloud-tools-common - 6.8.0-1009.9 linux-ibm-headers-6.8.0-1009 - 6.8.0-1009.9 linux-ibm-lts-24.04 - 6.8.0-1009.9 linux-ibm-source-6.8.0 - 6.8.0-1009.9 linux-ibm-tools-6.8.0-1009 - 6.8.0-1009.9 linux-image-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-ibm - 6.8.0-1009.9 linux-image-ibm-classic - 6.8.0-1009.9 linux-image-ibm-lts-24.04 - 6.8.0-1009.9 linux-image-oem-24.04 - 6.8.0-1009.9 linux-image-oem-24.04a - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-uc-oem-24.04 - 6.8.0-1009.9 linux-image-uc-oem-24.04a - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-ipu6-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04 - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04a - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-iwlwifi-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-classic - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1009.9 linux-modules-usbio-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-usbio-oem-24.04 - 6.8.0-1009.9 linux-modules-usbio-oem-24.04a - 6.8.0-1009.9 linux-oem-24.04 - 6.8.0-1009.9 linux-oem-24.04a - 6.8.0-1009.9 linux-oem-6.8-headers-6.8.0-1009 - 6.8.0-1009.9 linux-oem-6.8-tools-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-ibm - 6.8.0-1009.9 linux-tools-6.8.0-1009-oem - 6.8.0-1009.9 linux-tools-ibm - 6.8.0-1009.9 linux-tools-ibm-classic - 6.8.0-1009.9 linux-tools-ibm-lts-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04a - 6.8.0-1009.9 No subscription required linux-buildinfo-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-cloud-tools-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-headers-nvidia - 6.8.0-1010.10 linux-headers-nvidia-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-nvidia - 6.8.0-1010.10 linux-image-nvidia-64k - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1010.10 linux-nvidia - 6.8.0-1010.10 linux-nvidia-64k - 6.8.0-1010.10 linux-nvidia-headers-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-host - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-tools-nvidia - 6.8.0-1010.10 linux-tools-nvidia-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-gcp - 6.8.0-1011.12 linux-gcp - 6.8.0-1011.12 linux-gcp-headers-6.8.0-1011 - 6.8.0-1011.12 linux-gcp-tools-6.8.0-1011 - 6.8.0-1011.12 linux-headers-6.8.0-1011-gcp - 6.8.0-1011.12 linux-headers-gcp - 6.8.0-1011.12 linux-image-6.8.0-1011-gcp - 6.8.0-1011.12 linux-image-gcp - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-gcp - 6.8.0-1011.12 linux-tools-6.8.0-1011-gcp - 6.8.0-1011.12 linux-tools-gcp - 6.8.0-1011.12 No subscription required linux-aws - 6.8.0-1012.13 linux-aws-cloud-tools-6.8.0-1012 - 6.8.0-1012.13 linux-aws-headers-6.8.0-1012 - 6.8.0-1012.13 linux-aws-tools-6.8.0-1012 - 6.8.0-1012.13 linux-buildinfo-6.8.0-1012-aws - 6.8.0-1012.13 linux-cloud-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-aws - 6.8.0-1012.13 linux-image-6.8.0-1012-aws - 6.8.0-1012.13 linux-image-aws - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-aws - 6.8.0-1012.13 linux-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-tools-aws - 6.8.0-1012.13 No subscription required linux-buildinfo-6.8.0-39-generic - 6.8.0-39.39 linux-buildinfo-6.8.0-39-generic-64k - 6.8.0-39.39 linux-cloud-tools-6.8.0-39 - 6.8.0-39.39 linux-cloud-tools-6.8.0-39-generic - 6.8.0-39.39 linux-cloud-tools-common - 6.8.0-39.39 linux-cloud-tools-generic - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-cloud-tools-virtual - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-crashdump - 6.8.0-39.39 linux-doc - 6.8.0-39.39 linux-generic - 6.8.0-39.39 linux-generic-64k - 6.8.0-39.39 linux-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-generic-hwe-24.04 - 6.8.0-39.39 linux-generic-hwe-24.04-edge - 6.8.0-39.39 linux-generic-lpae - 6.8.0-39.39 linux-headers-6.8.0-39 - 6.8.0-39.39 linux-headers-6.8.0-39-generic - 6.8.0-39.39 linux-headers-6.8.0-39-generic-64k - 6.8.0-39.39 linux-headers-generic - 6.8.0-39.39 linux-headers-generic-64k - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-lpae - 6.8.0-39.39 linux-headers-kvm - 6.8.0-39.39 linux-headers-laptop-23.10 - 6.8.0-39.39 linux-headers-oem-20.04 - 6.8.0-39.39 linux-headers-oem-20.04b - 6.8.0-39.39 linux-headers-oem-20.04c - 6.8.0-39.39 linux-headers-oem-20.04d - 6.8.0-39.39 linux-headers-oem-22.04 - 6.8.0-39.39 linux-headers-virtual - 6.8.0-39.39 linux-headers-virtual-hwe-24.04 - 6.8.0-39.39 linux-headers-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-6.8.0-39-generic - 6.8.0-39.39 linux-image-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-extra-virtual - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic - 6.8.0-39.39 linux-image-generic-64k - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-hwe-24.04 - 6.8.0-39.39 linux-image-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-lpae - 6.8.0-39.39 linux-image-kvm - 6.8.0-39.39 linux-image-laptop-23.10 - 6.8.0-39.39 linux-image-oem-20.04 - 6.8.0-39.39 linux-image-oem-20.04b - 6.8.0-39.39 linux-image-oem-20.04c - 6.8.0-39.39 linux-image-oem-20.04d - 6.8.0-39.39 linux-image-oem-22.04 - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-uc-generic - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04 - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-virtual - 6.8.0-39.39 linux-image-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-kvm - 6.8.0-39.39 linux-laptop-23.10 - 6.8.0-39.39 linux-lib-rust-6.8.0-39-generic - 6.8.0-39.39 linux-libc-dev - 6.8.0-39.39 linux-modules-6.8.0-39-generic - 6.8.0-39.39 linux-modules-6.8.0-39-generic-64k - 6.8.0-39.39 linux-modules-extra-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-generic - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-6.8.0-39-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04 - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04d - 6.8.0-39.39 linux-modules-iwlwifi-oem-22.04 - 6.8.0-39.39 linux-modules-usbio-6.8.0-39-generic - 6.8.0-39.39 linux-modules-usbio-generic - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-39.39 linux-oem-20.04 - 6.8.0-39.39 linux-oem-20.04b - 6.8.0-39.39 linux-oem-20.04c - 6.8.0-39.39 linux-oem-20.04d - 6.8.0-39.39 linux-oem-22.04 - 6.8.0-39.39 linux-source - 6.8.0-39.39 linux-source-6.8.0 - 6.8.0-39.39 linux-tools-6.8.0-39 - 6.8.0-39.39 linux-tools-6.8.0-39-generic - 6.8.0-39.39 linux-tools-6.8.0-39-generic-64k - 6.8.0-39.39 linux-tools-common - 6.8.0-39.39 linux-tools-generic - 6.8.0-39.39 linux-tools-generic-64k - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-lpae - 6.8.0-39.39 linux-tools-host - 6.8.0-39.39 linux-tools-kvm - 6.8.0-39.39 linux-tools-laptop-23.10 - 6.8.0-39.39 linux-tools-oem-20.04 - 6.8.0-39.39 linux-tools-oem-20.04b - 6.8.0-39.39 linux-tools-oem-20.04c - 6.8.0-39.39 linux-tools-oem-20.04d - 6.8.0-39.39 linux-tools-oem-22.04 - 6.8.0-39.39 linux-tools-virtual - 6.8.0-39.39 linux-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-virtual - 6.8.0-39.39 linux-virtual-hwe-24.04 - 6.8.0-39.39 linux-virtual-hwe-24.04-edge - 6.8.0-39.39 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6921-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984, CVE-2024-35992, CVE-2024-36008) Update Instructions: Run `sudo pro fix USN-6921-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-buildinfo-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-cloud-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency - 6.8.0-39.39.1 linux-headers-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency - 6.8.0-39.39.1 linux-image-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency - 6.8.0-39.39.1 linux-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-common - 6.8.0-39.39.1 linux-lowlatency-headers-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-lib-rust-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-lowlatency-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-tools-common - 6.8.0-39.39.1 linux-lowlatency-tools-host - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-modules-iwlwifi-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency - 6.8.0-39.39.1 linux-tools-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6929-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6929-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u422-b05-1~24.04 openjdk-8-doc - 8u422-b05-1~24.04 openjdk-8-jdk - 8u422-b05-1~24.04 openjdk-8-jdk-headless - 8u422-b05-1~24.04 openjdk-8-jre - 8u422-b05-1~24.04 openjdk-8-jre-headless - 8u422-b05-1~24.04 openjdk-8-jre-zero - 8u422-b05-1~24.04 openjdk-8-source - 8u422-b05-1~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6930-1 -- OpenJDK 11 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 11 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6930-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-doc - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-zero - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-source - 11.0.24+8-1ubuntu3~24.04.1 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6931-1 -- OpenJDK 17 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 17 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6931-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.12+7-1ubuntu2~24.04 openjdk-17-doc - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-zero - 17.0.12+7-1ubuntu2~24.04 openjdk-17-source - 17.0.12+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6932-1 -- OpenJDK 21 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 21 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 21 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 21 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6932-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.4+7-1ubuntu2~24.04 openjdk-21-doc - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-zero - 21.0.4+7-1ubuntu2~24.04 openjdk-21-source - 21.0.4+7-1ubuntu2~24.04 openjdk-21-testsupport - 21.0.4+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6934-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.39 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html https://www.oracle.com/security-alerts/cpujul2024.html Update Instructions: Run `sudo pro fix USN-6934-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.39-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.39-0ubuntu0.24.04.1 mysql-client - 8.0.39-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-router - 8.0.39-0ubuntu0.24.04.1 mysql-server - 8.0.39-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.39-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20996 CVE-2024-21125 CVE-2024-21127 CVE-2024-21129 CVE-2024-21130 CVE-2024-21134 CVE-2024-21142 CVE-2024-21162 CVE-2024-21163 CVE-2024-21165 CVE-2024-21171 CVE-2024-21173 CVE-2024-21177 CVE-2024-21179 CVE-2024-21185 USN-6937-1 -- OpenSSL vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when certain non-default TLS server configurations were in use. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2024-2511) It was discovered that OpenSSL incorrectly handled checking excessively long DSA keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-4603) William Ahern discovered that OpenSSL incorrectly handled certain memory operations in a rarely-used API. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-4741) Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a certain API with an empty supported client protocols buffer. A remote attacker could possibly use this issue to obtain sensitive information, or cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535) Update Instructions: Run `sudo pro fix USN-6937-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.2 libssl-doc - 3.0.13-0ubuntu3.2 libssl3t64 - 3.0.13-0ubuntu3.2 openssl - 3.0.13-0ubuntu3.2 No subscription required Low CVE-2024-2511 CVE-2024-4603 CVE-2024-4741 CVE-2024-5535 USN-6939-1 -- Exim vulnerability Ubuntu 24.04 LTS Phillip Szelat discovered that Exim misparses multiline MIME header filenames. A remote attacker could use this issue to bypass a MIME filename extension-blocking protection mechanism and possibly deliver executable attachments to the mailboxes of end users. Update Instructions: Run `sudo pro fix USN-6939-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.1 exim4-base - 4.97-4ubuntu4.1 exim4-config - 4.97-4ubuntu4.1 exim4-daemon-heavy - 4.97-4ubuntu4.1 exim4-daemon-light - 4.97-4ubuntu4.1 exim4-dev - 4.97-4ubuntu4.1 eximon4 - 4.97-4ubuntu4.1 No subscription required Medium CVE-2024-39929 USN-6940-1 -- snapd vulnerabilities Ubuntu 24.04 LTS Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. (CVE-2024-1724) Zeyad Gouda discovered that snapd failed to properly check the file type when extracting a snap. An attacker who could convince a user to install a malicious snap containing non-regular files could then cause snapd to block indefinitely while trying to read from such files and cause a denial of service. (CVE-2024-29068) Zeyad Gouda discovered that snapd failed to properly check the destination of symbolic links when extracting a snap. An attacker who could convince a user to install a malicious snap containing crafted symbolic links could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow a local unprivileged user to gain access to privileged information. (CVE-2024-29069) Update Instructions: Run `sudo pro fix USN-6940-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-snapcore-snapd-dev - 2.63+24.04ubuntu0.1 golang-github-ubuntu-core-snappy-dev - 2.63+24.04ubuntu0.1 snap-confine - 2.63+24.04ubuntu0.1 snapd - 2.63+24.04ubuntu0.1 snapd-xdg-open - 2.63+24.04ubuntu0.1 ubuntu-core-launcher - 2.63+24.04ubuntu0.1 ubuntu-core-snapd-units - 2.63+24.04ubuntu0.1 ubuntu-snappy - 2.63+24.04ubuntu0.1 ubuntu-snappy-cli - 2.63+24.04ubuntu0.1 No subscription required Medium CVE-2024-1724 CVE-2024-29068 CVE-2024-29069 USN-6941-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies. Update Instructions: Run `sudo pro fix USN-6941-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.1 libpython3.12-dev - 3.12.3-1ubuntu0.1 libpython3.12-minimal - 3.12.3-1ubuntu0.1 libpython3.12-stdlib - 3.12.3-1ubuntu0.1 libpython3.12-testsuite - 3.12.3-1ubuntu0.1 libpython3.12t64 - 3.12.3-1ubuntu0.1 python3.12 - 3.12.3-1ubuntu0.1 python3.12-dev - 3.12.3-1ubuntu0.1 python3.12-doc - 3.12.3-1ubuntu0.1 python3.12-examples - 3.12.3-1ubuntu0.1 python3.12-full - 3.12.3-1ubuntu0.1 python3.12-minimal - 3.12.3-1ubuntu0.1 python3.12-nopie - 3.12.3-1ubuntu0.1 python3.12-venv - 3.12.3-1ubuntu0.1 No subscription required Low CVE-2024-4032 USN-6942-1 -- Gross vulnerability Ubuntu 24.04 LTS It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6942-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gross - 1.0.2-4ubuntu0.24.04.1 No subscription required Medium CVE-2023-52159 USN-6944-1 -- curl vulnerability Ubuntu 24.04 LTS Dov Murik discovered that curl incorrectly handled parsing ASN.1 Generalized Time fields. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Update Instructions: Run `sudo pro fix USN-6944-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.2 libcurl3t64-gnutls - 8.5.0-2ubuntu10.2 libcurl4-doc - 8.5.0-2ubuntu10.2 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.2 libcurl4-openssl-dev - 8.5.0-2ubuntu10.2 libcurl4t64 - 8.5.0-2ubuntu10.2 No subscription required Medium CVE-2024-7264 USN-6945-1 -- wpa_supplicant and hostapd vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. Update Instructions: Run `sudo pro fix USN-6945-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.1 hostapd - 2:2.10-21ubuntu0.1 libwpa-client-dev - 2:2.10-21ubuntu0.1 wpagui - 2:2.10-21ubuntu0.1 wpasupplicant - 2:2.10-21ubuntu0.1 No subscription required Medium CVE-2024-5290 https://launchpad.net/bugs/2067613 USN-6946-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain strings in floatformat function. An attacker could possibly use this issue to cause a memory exhaustion. (CVE-2024-41989) It was discovered that Django incorrectly handled very large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41990) It was discovered that Django in AdminURLFieldWidget incorrectly handled certain inputs with a very large number of Unicode characters. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41991) It was discovered that Django incorrectly handled certain JSON objects. An attacker could possibly use this issue to cause a potential SQL injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-42005) Update Instructions: Run `sudo pro fix USN-6946-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.2 python3-django - 3:4.2.11-1ubuntu1.2 No subscription required Medium CVE-2024-41989 CVE-2024-41990 CVE-2024-41991 CVE-2024-42005 USN-6947-1 -- Kerberos vulnerabilities Ubuntu 24.04 LTS It was discovered that Kerberos incorrectly handled GSS message tokens where an unwrapped token could appear to be truncated. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37370) It was discovered that Kerberos incorrectly handled GSS message tokens when sent a token with invalid length fields. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37371) Update Instructions: Run `sudo pro fix USN-6947-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.1 krb5-doc - 1.20.1-6ubuntu2.1 krb5-gss-samples - 1.20.1-6ubuntu2.1 krb5-k5tls - 1.20.1-6ubuntu2.1 krb5-kdc - 1.20.1-6ubuntu2.1 krb5-kdc-ldap - 1.20.1-6ubuntu2.1 krb5-kpropd - 1.20.1-6ubuntu2.1 krb5-locales - 1.20.1-6ubuntu2.1 krb5-multidev - 1.20.1-6ubuntu2.1 krb5-otp - 1.20.1-6ubuntu2.1 krb5-pkinit - 1.20.1-6ubuntu2.1 krb5-user - 1.20.1-6ubuntu2.1 libgssapi-krb5-2 - 1.20.1-6ubuntu2.1 libgssrpc4t64 - 1.20.1-6ubuntu2.1 libk5crypto3 - 1.20.1-6ubuntu2.1 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.1 libkadm5srv-mit12 - 1.20.1-6ubuntu2.1 libkdb5-10t64 - 1.20.1-6ubuntu2.1 libkrad-dev - 1.20.1-6ubuntu2.1 libkrad0 - 1.20.1-6ubuntu2.1 libkrb5-3 - 1.20.1-6ubuntu2.1 libkrb5-dev - 1.20.1-6ubuntu2.1 libkrb5support0 - 1.20.1-6ubuntu2.1 No subscription required Medium CVE-2024-37370 CVE-2024-37371 USN-6949-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gke - 6.8.0-1008.11 linux-gke - 6.8.0-1008.11 linux-gke-headers-6.8.0-1008 - 6.8.0-1008.11 linux-gke-tools-6.8.0-1008 - 6.8.0-1008.11 linux-headers-6.8.0-1008-gke - 6.8.0-1008.11 linux-headers-gke - 6.8.0-1008.11 linux-image-6.8.0-1008-gke - 6.8.0-1008.11 linux-image-gke - 6.8.0-1008.11 linux-image-unsigned-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-extra-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-gke - 6.8.0-1008.11 linux-tools-6.8.0-1008-gke - 6.8.0-1008.11 linux-tools-gke - 6.8.0-1008.11 No subscription required linux-buildinfo-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-ibm - 6.8.0-1010.10 linux-headers-ibm-classic - 6.8.0-1010.10 linux-headers-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm - 6.8.0-1010.10 linux-ibm-classic - 6.8.0-1010.10 linux-ibm-cloud-tools-common - 6.8.0-1010.10 linux-ibm-headers-6.8.0-1010 - 6.8.0-1010.10 linux-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm-source-6.8.0 - 6.8.0-1010.10 linux-ibm-tools-6.8.0-1010 - 6.8.0-1010.10 linux-image-6.8.0-1010-ibm - 6.8.0-1010.10 linux-image-ibm - 6.8.0-1010.10 linux-image-ibm-classic - 6.8.0-1010.10 linux-image-ibm-lts-24.04 - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-classic - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1010.10 linux-tools-6.8.0-1010-ibm - 6.8.0-1010.10 linux-tools-ibm - 6.8.0-1010.10 linux-tools-ibm-classic - 6.8.0-1010.10 linux-tools-ibm-lts-24.04 - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-cloud-tools-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-headers-nvidia - 6.8.0-1011.11 linux-headers-nvidia-64k - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-nvidia - 6.8.0-1011.11 linux-image-nvidia-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1011.11 linux-nvidia - 6.8.0-1011.11 linux-nvidia-64k - 6.8.0-1011.11 linux-nvidia-headers-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-host - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-tools-nvidia - 6.8.0-1011.11 linux-tools-nvidia-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-gcp - 6.8.0-1012.13 linux-gcp - 6.8.0-1012.13 linux-gcp-headers-6.8.0-1012 - 6.8.0-1012.13 linux-gcp-tools-6.8.0-1012 - 6.8.0-1012.13 linux-headers-6.8.0-1012-gcp - 6.8.0-1012.13 linux-headers-gcp - 6.8.0-1012.13 linux-image-6.8.0-1012-gcp - 6.8.0-1012.13 linux-image-gcp - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-gcp - 6.8.0-1012.13 linux-tools-6.8.0-1012-gcp - 6.8.0-1012.13 linux-tools-gcp - 6.8.0-1012.13 No subscription required linux-aws - 6.8.0-1013.14 linux-aws-cloud-tools-6.8.0-1013 - 6.8.0-1013.14 linux-aws-headers-6.8.0-1013 - 6.8.0-1013.14 linux-aws-tools-6.8.0-1013 - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-aws - 6.8.0-1013.14 linux-cloud-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-aws - 6.8.0-1013.14 linux-image-6.8.0-1013-aws - 6.8.0-1013.14 linux-image-aws - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-aws - 6.8.0-1013.14 linux-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-tools-aws - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-40-generic - 6.8.0-40.40 linux-buildinfo-6.8.0-40-generic-64k - 6.8.0-40.40 linux-cloud-tools-6.8.0-40 - 6.8.0-40.40 linux-cloud-tools-6.8.0-40-generic - 6.8.0-40.40 linux-cloud-tools-common - 6.8.0-40.40 linux-cloud-tools-generic - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-cloud-tools-virtual - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-crashdump - 6.8.0-40.40 linux-doc - 6.8.0-40.40 linux-generic - 6.8.0-40.40 linux-generic-64k - 6.8.0-40.40 linux-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-generic-hwe-24.04 - 6.8.0-40.40 linux-generic-hwe-24.04-edge - 6.8.0-40.40 linux-generic-lpae - 6.8.0-40.40 linux-headers-6.8.0-40 - 6.8.0-40.40 linux-headers-6.8.0-40-generic - 6.8.0-40.40 linux-headers-6.8.0-40-generic-64k - 6.8.0-40.40 linux-headers-generic - 6.8.0-40.40 linux-headers-generic-64k - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-lpae - 6.8.0-40.40 linux-headers-kvm - 6.8.0-40.40 linux-headers-laptop-23.10 - 6.8.0-40.40 linux-headers-oem-20.04 - 6.8.0-40.40 linux-headers-oem-20.04b - 6.8.0-40.40 linux-headers-oem-20.04c - 6.8.0-40.40 linux-headers-oem-20.04d - 6.8.0-40.40 linux-headers-oem-22.04 - 6.8.0-40.40 linux-headers-virtual - 6.8.0-40.40 linux-headers-virtual-hwe-24.04 - 6.8.0-40.40 linux-headers-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-6.8.0-40-generic - 6.8.0-40.40 linux-image-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-extra-virtual - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic - 6.8.0-40.40 linux-image-generic-64k - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-hwe-24.04 - 6.8.0-40.40 linux-image-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-lpae - 6.8.0-40.40 linux-image-kvm - 6.8.0-40.40 linux-image-laptop-23.10 - 6.8.0-40.40 linux-image-oem-20.04 - 6.8.0-40.40 linux-image-oem-20.04b - 6.8.0-40.40 linux-image-oem-20.04c - 6.8.0-40.40 linux-image-oem-20.04d - 6.8.0-40.40 linux-image-oem-22.04 - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-uc-generic - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04 - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-virtual - 6.8.0-40.40 linux-image-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-kvm - 6.8.0-40.40 linux-laptop-23.10 - 6.8.0-40.40 linux-lib-rust-6.8.0-40-generic - 6.8.0-40.40 linux-libc-dev - 6.8.0-40.40 linux-modules-6.8.0-40-generic - 6.8.0-40.40 linux-modules-6.8.0-40-generic-64k - 6.8.0-40.40 linux-modules-extra-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-generic - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-6.8.0-40-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04 - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04d - 6.8.0-40.40 linux-modules-iwlwifi-oem-22.04 - 6.8.0-40.40 linux-modules-usbio-6.8.0-40-generic - 6.8.0-40.40 linux-modules-usbio-generic - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-40.40 linux-oem-20.04 - 6.8.0-40.40 linux-oem-20.04b - 6.8.0-40.40 linux-oem-20.04c - 6.8.0-40.40 linux-oem-20.04d - 6.8.0-40.40 linux-oem-22.04 - 6.8.0-40.40 linux-source - 6.8.0-40.40 linux-source-6.8.0 - 6.8.0-40.40 linux-tools-6.8.0-40 - 6.8.0-40.40 linux-tools-6.8.0-40-generic - 6.8.0-40.40 linux-tools-6.8.0-40-generic-64k - 6.8.0-40.40 linux-tools-common - 6.8.0-40.40 linux-tools-generic - 6.8.0-40.40 linux-tools-generic-64k - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-lpae - 6.8.0-40.40 linux-tools-host - 6.8.0-40.40 linux-tools-kvm - 6.8.0-40.40 linux-tools-laptop-23.10 - 6.8.0-40.40 linux-tools-oem-20.04 - 6.8.0-40.40 linux-tools-oem-20.04b - 6.8.0-40.40 linux-tools-oem-20.04c - 6.8.0-40.40 linux-tools-oem-20.04d - 6.8.0-40.40 linux-tools-oem-22.04 - 6.8.0-40.40 linux-tools-virtual - 6.8.0-40.40 linux-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-virtual - 6.8.0-40.40 linux-virtual-hwe-24.04 - 6.8.0-40.40 linux-virtual-hwe-24.04-edge - 6.8.0-40.40 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6949-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-raspi - 6.8.0-1009.10 linux-image-6.8.0-1009-raspi - 6.8.0-1009.10 linux-image-raspi - 6.8.0-1009.10 linux-modules-6.8.0-1009-raspi - 6.8.0-1009.10 linux-raspi - 6.8.0-1009.10 linux-raspi-headers-6.8.0-1009 - 6.8.0-1009.10 linux-raspi-tools-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-raspi - 6.8.0-1009.10 linux-tools-raspi - 6.8.0-1009.10 No subscription required linux-buildinfo-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-buildinfo-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-cloud-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency - 6.8.0-40.40.1 linux-headers-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency - 6.8.0-40.40.1 linux-image-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency - 6.8.0-40.40.1 linux-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-common - 6.8.0-40.40.1 linux-lowlatency-headers-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-lib-rust-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-lowlatency-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-tools-common - 6.8.0-40.40.1 linux-lowlatency-tools-host - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-modules-iwlwifi-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency - 6.8.0-40.40.1 linux-tools-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oracle - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-oracle - 6.8.0-1010.10 linux-headers-oracle-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-image-oracle - 6.8.0-1010.10 linux-image-oracle-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-iwlwifi-oracle - 6.8.0-1010.10 linux-oracle - 6.8.0-1010.10 linux-oracle-64k - 6.8.0-1010.10 linux-oracle-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oracle-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-tools-oracle - 6.8.0-1010.10 linux-tools-oracle-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-buildinfo-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-extra-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency - 6.8.0-1011.11.1 linux-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency-headers-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1011.11.1 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-2 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1012.14 linux-azure-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-azure-fde - 6.8.0-1012.14 linux-azure-headers-6.8.0-1012 - 6.8.0-1012.14 linux-azure-tools-6.8.0-1012 - 6.8.0-1012.14 linux-buildinfo-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-azure - 6.8.0-1012.14 linux-headers-6.8.0-1012-azure - 6.8.0-1012.14 linux-headers-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure-fde - 6.8.0-1012.14 linux-image-azure - 6.8.0-1012.14 linux-image-azure-fde - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-azure - 6.8.0-1012.14 linux-modules-involflt-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-involflt-azure - 6.8.0-1012.14 linux-modules-iwlwifi-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-iwlwifi-azure - 6.8.0-1012.14 linux-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-tools-azure - 6.8.0-1012.14 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6955-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-35987, CVE-2024-36931, CVE-2024-38614, CVE-2024-35857, CVE-2024-36949, CVE-2024-38599, CVE-2024-35994, CVE-2024-35849, CVE-2024-36916, CVE-2024-38590, CVE-2024-36944, CVE-2024-38561, CVE-2024-38538, CVE-2024-36017, CVE-2024-38593, CVE-2024-36028, CVE-2024-36960, CVE-2024-36002, CVE-2024-36967, CVE-2024-36898, CVE-2024-35989, CVE-2024-36975, CVE-2024-38578, CVE-2024-38582, CVE-2024-38588, CVE-2024-38579, CVE-2024-38617, CVE-2024-36901, CVE-2024-38550, CVE-2023-52882, CVE-2024-38603, CVE-2024-38620, CVE-2024-36956, CVE-2024-36880, CVE-2024-36895, CVE-2024-36979, CVE-2024-36887, CVE-2024-27396, CVE-2024-27400, CVE-2024-36952, CVE-2024-36886, CVE-2024-36905, CVE-2024-36883, CVE-2024-38540, CVE-2024-38605, CVE-2024-36029, CVE-2024-36934, CVE-2024-27395, CVE-2024-36000, CVE-2024-38549, CVE-2024-35999, CVE-2024-38585, CVE-2024-38589, CVE-2024-38565, CVE-2024-36917, CVE-2024-36930, CVE-2024-36940, CVE-2024-36900, CVE-2024-35850, CVE-2024-38592, CVE-2024-38553, CVE-2024-36929, CVE-2024-36915, CVE-2024-36004, CVE-2024-38573, CVE-2024-36941, CVE-2024-38607, CVE-2024-36009, CVE-2024-27398, CVE-2024-36909, CVE-2024-35848, CVE-2024-36950, CVE-2024-38564, CVE-2024-36947, CVE-2024-38613, CVE-2024-38570, CVE-2024-38612, CVE-2024-38580, CVE-2024-38557, CVE-2024-36959, CVE-2024-27399, CVE-2024-41011, CVE-2024-36928, CVE-2024-38543, CVE-2024-38541, CVE-2024-38583, CVE-2024-35855, CVE-2024-38611, CVE-2024-36891, CVE-2024-38587, CVE-2024-35851, CVE-2024-38546, CVE-2024-38596, CVE-2024-35998, CVE-2024-35991, CVE-2024-36965, CVE-2024-36925, CVE-2024-36894, CVE-2024-38567, CVE-2024-38572, CVE-2024-36882, CVE-2024-38594, CVE-2024-38563, CVE-2024-38616, CVE-2024-36951, CVE-2024-36005, CVE-2024-42134, CVE-2024-38602, CVE-2024-36014, CVE-2024-38601, CVE-2024-36001, CVE-2024-38575, CVE-2024-27401, CVE-2024-36961, CVE-2024-38576, CVE-2024-36935, CVE-2024-36893, CVE-2024-38562, CVE-2024-36904, CVE-2024-36939, CVE-2024-38591, CVE-2024-38539, CVE-2024-36030, CVE-2024-36920, CVE-2024-39482, CVE-2024-36977, CVE-2024-36013, CVE-2024-35856, CVE-2024-36922, CVE-2024-36033, CVE-2024-35859, CVE-2024-36919, CVE-2024-35846, CVE-2024-36913, CVE-2024-35854, CVE-2024-36924, CVE-2024-38547, CVE-2024-38551, CVE-2024-36899, CVE-2024-36932, CVE-2024-38545, CVE-2024-36966, CVE-2024-36911, CVE-2024-36946, CVE-2024-36906, CVE-2024-38595, CVE-2024-36012, CVE-2024-38552, CVE-2024-36933, CVE-2024-36936, CVE-2024-38548, CVE-2024-38558, CVE-2024-36006, CVE-2024-36908, CVE-2024-36892, CVE-2024-35988, CVE-2024-35993, CVE-2024-36914, CVE-2024-36896, CVE-2024-38615, CVE-2024-36890, CVE-2024-36969, CVE-2024-38559, CVE-2024-36964, CVE-2024-38560, CVE-2024-38574, CVE-2024-36962, CVE-2024-38542, CVE-2024-36926, CVE-2024-36968, CVE-2024-36032, CVE-2024-38544, CVE-2024-36938, CVE-2024-38597, CVE-2024-38577, CVE-2024-36958, CVE-2024-36945, CVE-2024-36943, CVE-2024-38610, CVE-2024-36927, CVE-2024-38554, CVE-2024-38555, CVE-2024-36031, CVE-2024-36011, CVE-2024-38569, CVE-2024-35847, CVE-2024-36921, CVE-2024-38606, CVE-2024-35949, CVE-2024-35947, CVE-2024-36889, CVE-2024-36884, CVE-2024-36954, CVE-2024-36902, CVE-2024-36007, CVE-2024-38586, CVE-2024-36918, CVE-2024-38571, CVE-2024-36955, CVE-2024-36888, CVE-2024-38556, CVE-2024-38604, CVE-2024-27394, CVE-2024-38600, CVE-2024-35983, CVE-2024-38568, CVE-2024-38566, CVE-2024-35853, CVE-2024-35858, CVE-2024-36910, CVE-2024-36903, CVE-2024-36881, CVE-2024-36937, CVE-2024-36957, CVE-2024-36912, CVE-2024-36948, CVE-2024-36953, CVE-2024-35996, CVE-2024-36963, CVE-2024-36923, CVE-2024-35852, CVE-2024-38598, CVE-2024-36003, CVE-2024-35986, CVE-2024-38584) Update Instructions: Run `sudo pro fix USN-6955-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-oem-24.04 - 6.8.0-1010.10 linux-headers-oem-24.04a - 6.8.0-1010.10 linux-image-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-oem-24.04 - 6.8.0-1010.10 linux-image-oem-24.04a - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-uc-oem-24.04 - 6.8.0-1010.10 linux-image-uc-oem-24.04a - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04 - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04a - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1010.10 linux-modules-usbio-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-usbio-oem-24.04 - 6.8.0-1010.10 linux-modules-usbio-oem-24.04a - 6.8.0-1010.10 linux-oem-24.04 - 6.8.0-1010.10 linux-oem-24.04a - 6.8.0-1010.10 linux-oem-6.8-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oem-6.8-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oem - 6.8.0-1010.10 linux-tools-oem-24.04 - 6.8.0-1010.10 linux-tools-oem-24.04a - 6.8.0-1010.10 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6959-1 -- .NET vulnerability Ubuntu 24.04 LTS It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Update Instructions: Run `sudo pro fix USN-6959-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.108-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.108-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.108-8.0.8-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-38167 USN-6961-1 -- BusyBox vulnerabilities Ubuntu 24.04 LTS It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48174) It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365) Update Instructions: Run `sudo pro fix USN-6961-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: busybox - 1:1.36.1-6ubuntu3.1 busybox-initramfs - 1:1.36.1-6ubuntu3.1 busybox-static - 1:1.36.1-6ubuntu3.1 busybox-syslogd - 1:1.36.1-6ubuntu3.1 udhcpc - 1:1.36.1-6ubuntu3.1 udhcpd - 1:1.36.1-6ubuntu3.1 No subscription required Medium CVE-2022-48174 CVE-2023-42363 CVE-2023-42364 CVE-2023-42365 USN-6962-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros. Update Instructions: Run `sudo pro fix USN-6962-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.5-0ubuntu0.24.04.2 libjuh-java - 4:24.2.5-0ubuntu0.24.04.2 libjurt-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.5-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.5-0ubuntu0.24.04.2 libreoffice - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.5-0ubuntu0.24.04.2 libridl-java - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libunoil-java - 4:24.2.5-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.5-0ubuntu0.24.04.2 python3-access2base - 4:24.2.5-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.5-0ubuntu0.24.04.2 python3-uno - 4:24.2.5-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.5-0ubuntu0.24.04.2 ure - 4:24.2.5-0ubuntu0.24.04.2 ure-java - 4:24.2.5-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-6472 USN-6963-1 -- GNOME Shell vulnerability Ubuntu 24.04 LTS It was discovered that GNOME Shell incorrectly opened the portal helper automatically when detecting a captive network portal. A remote attacker could possibly use this issue to load arbitrary web pages containing JavaScript, leading to resource consumption or other attacks. Update Instructions: Run `sudo pro fix USN-6963-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-shell - 46.0-0ubuntu6~24.04.3 gnome-shell-common - 46.0-0ubuntu6~24.04.3 gnome-shell-extension-prefs - 46.0-0ubuntu6~24.04.3 No subscription required Medium CVE-2024-36472 USN-6964-1 -- ORC vulnerability Ubuntu 24.04 LTS Noriko Totsuka discovered that ORC incorrectly handled certain crafted file. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6964-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liborc-0.4-0t64 - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev-bin - 1:0.4.38-1ubuntu0.1 liborc-0.4-doc - 1:0.4.38-1ubuntu0.1 No subscription required Medium CVE-2024-40897 USN-6967-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-42667) It was discovered that some Intel® Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-49141) It was discovered that some Intel® Processors did not correctly transition between the executive monitor and SMI transfer monitor (STM). A privileged local attacker could use this to escalate their privileges. (CVE-2024-24853) It was discovered that some 3rd, 4th, and 5th Generation Intel® Xeon® Processors failed to properly implement a protection mechanism. A local attacker could use this to potentially escalate their privileges. (CVE-2024-24980) It was discovered that some 3rd Generation Intel Xeon Scalable Processors did not properly handle mirrored regions with different values. A privileged local user could use this to cause a denial of service (system crash). (CVE-2024-25939) Update Instructions: Run `sudo pro fix USN-6967-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240813.0ubuntu0.24.04.2 No subscription required Medium CVE-2023-42667 CVE-2023-49141 CVE-2024-24853 CVE-2024-24980 CVE-2024-25939 USN-6968-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser. Update Instructions: Run `sudo pro fix USN-6968-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.4-0ubuntu0.24.04.1 libecpg-dev - 16.4-0ubuntu0.24.04.1 libecpg6 - 16.4-0ubuntu0.24.04.1 libpgtypes3 - 16.4-0ubuntu0.24.04.1 libpq-dev - 16.4-0ubuntu0.24.04.1 libpq5 - 16.4-0ubuntu0.24.04.1 postgresql-16 - 16.4-0ubuntu0.24.04.1 postgresql-client-16 - 16.4-0ubuntu0.24.04.1 postgresql-doc-16 - 16.4-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.4-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.4-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.4-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.4-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-7348 USN-6969-1 -- Cacti vulnerabilities Ubuntu 24.04 LTS It was discovered that Cacti did not properly apply checks to the "Package Import" feature. An attacker could possibly use this issue to perform arbitrary code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-25641) It was discovered that Cacti did not properly sanitize values when using javascript based API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29894) It was discovered that Cacti did not properly sanitize values when managing data queries. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31443) It was discovered that Cacti did not properly sanitize values when reading tree rules with Automation API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31444) It was discovered that Cacti did not properly sanitize "get_request_var('filter')" values in the "api_automation.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31445) It was discovered that Cacti did not properly sanitize data stored in "form_save()" function in the "graph_template_inputs.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. (CVE-2024-31458) It was discovered that Cacti did not properly validate the file urls from the lib/plugin.php file. An attacker could possibly use this issue to perform arbitrary code execution. (CVE-2024-31459) It was discovered that Cacti did not properly validate the data stored in the "automation_tree_rules.php". A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31460) It was discovered that Cacti did not properly verify the user password. An attacker could possibly use this issue to bypass authentication mechanism. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-34360) Update Instructions: Run `sudo pro fix USN-6969-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cacti - 1.2.26+ds1-1ubuntu0.1 No subscription required Medium CVE-2024-25641 CVE-2024-29894 CVE-2024-31443 CVE-2024-31444 CVE-2024-31445 CVE-2024-31458 CVE-2024-31459 CVE-2024-31460 CVE-2024-34340 USN-6975-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - User-Mode Linux (UML); - MMC subsystem; (CVE-2024-39292, CVE-2024-39484) Update Instructions: Run `sudo pro fix USN-6975-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gke - 6.8.0-1009.12 linux-gke - 6.8.0-1009.12 linux-gke-headers-6.8.0-1009 - 6.8.0-1009.12 linux-gke-tools-6.8.0-1009 - 6.8.0-1009.12 linux-headers-6.8.0-1009-gke - 6.8.0-1009.12 linux-headers-gke - 6.8.0-1009.12 linux-image-6.8.0-1009-gke - 6.8.0-1009.12 linux-image-gke - 6.8.0-1009.12 linux-image-unsigned-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-extra-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-gke - 6.8.0-1009.12 linux-tools-6.8.0-1009-gke - 6.8.0-1009.12 linux-tools-gke - 6.8.0-1009.12 No subscription required linux-buildinfo-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-raspi - 6.8.0-1010.11 linux-image-6.8.0-1010-raspi - 6.8.0-1010.11 linux-image-raspi - 6.8.0-1010.11 linux-modules-6.8.0-1010-raspi - 6.8.0-1010.11 linux-raspi - 6.8.0-1010.11 linux-raspi-headers-6.8.0-1010 - 6.8.0-1010.11 linux-raspi-tools-6.8.0-1010 - 6.8.0-1010.11 linux-tools-6.8.0-1010-raspi - 6.8.0-1010.11 linux-tools-raspi - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-1011-ibm - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oem - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-6.8.0-1011-ibm - 6.8.0-1011.11 linux-headers-6.8.0-1011-oem - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-ibm - 6.8.0-1011.11 linux-headers-ibm-classic - 6.8.0-1011.11 linux-headers-ibm-lts-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04a - 6.8.0-1011.11 linux-headers-oracle - 6.8.0-1011.11 linux-headers-oracle-64k - 6.8.0-1011.11 linux-ibm - 6.8.0-1011.11 linux-ibm-classic - 6.8.0-1011.11 linux-ibm-cloud-tools-common - 6.8.0-1011.11 linux-ibm-headers-6.8.0-1011 - 6.8.0-1011.11 linux-ibm-lts-24.04 - 6.8.0-1011.11 linux-ibm-source-6.8.0 - 6.8.0-1011.11 linux-ibm-tools-6.8.0-1011 - 6.8.0-1011.11 linux-image-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-image-ibm - 6.8.0-1011.11 linux-image-ibm-classic - 6.8.0-1011.11 linux-image-ibm-lts-24.04 - 6.8.0-1011.11 linux-image-oem-24.04 - 6.8.0-1011.11 linux-image-oem-24.04a - 6.8.0-1011.11 linux-image-oracle - 6.8.0-1011.11 linux-image-oracle-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-uc-oem-24.04 - 6.8.0-1011.11 linux-image-uc-oem-24.04a - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-ipu6-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04 - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-iwlwifi-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-classic - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-oracle - 6.8.0-1011.11 linux-modules-usbio-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-usbio-oem-24.04 - 6.8.0-1011.11 linux-modules-usbio-oem-24.04a - 6.8.0-1011.11 linux-oem-24.04 - 6.8.0-1011.11 linux-oem-24.04a - 6.8.0-1011.11 linux-oem-6.8-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oem-6.8-tools-6.8.0-1011 - 6.8.0-1011.11 linux-oracle - 6.8.0-1011.11 linux-oracle-64k - 6.8.0-1011.11 linux-oracle-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oracle-tools-6.8.0-1011 - 6.8.0-1011.11 linux-tools-6.8.0-1011-ibm - 6.8.0-1011.11 linux-tools-6.8.0-1011-oem - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-tools-ibm - 6.8.0-1011.11 linux-tools-ibm-classic - 6.8.0-1011.11 linux-tools-ibm-lts-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04a - 6.8.0-1011.11 linux-tools-oracle - 6.8.0-1011.11 linux-tools-oracle-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-cloud-tools-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-headers-nvidia - 6.8.0-1012.12 linux-headers-nvidia-64k - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-nvidia - 6.8.0-1012.12 linux-image-nvidia-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1012.12 linux-nvidia - 6.8.0-1012.12 linux-nvidia-64k - 6.8.0-1012.12 linux-nvidia-headers-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-host - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-tools-nvidia - 6.8.0-1012.12 linux-tools-nvidia-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-buildinfo-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-extra-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency - 6.8.0-1012.12.1 linux-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency-headers-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1012.12.1 No subscription required linux-buildinfo-6.8.0-1013-gcp - 6.8.0-1013.14 linux-gcp - 6.8.0-1013.14 linux-gcp-headers-6.8.0-1013 - 6.8.0-1013.14 linux-gcp-tools-6.8.0-1013 - 6.8.0-1013.14 linux-headers-6.8.0-1013-gcp - 6.8.0-1013.14 linux-headers-gcp - 6.8.0-1013.14 linux-image-6.8.0-1013-gcp - 6.8.0-1013.14 linux-image-gcp - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-gcp - 6.8.0-1013.14 linux-tools-6.8.0-1013-gcp - 6.8.0-1013.14 linux-tools-gcp - 6.8.0-1013.14 No subscription required linux-azure - 6.8.0-1013.15 linux-azure-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-azure-fde - 6.8.0-1013.15 linux-azure-headers-6.8.0-1013 - 6.8.0-1013.15 linux-azure-tools-6.8.0-1013 - 6.8.0-1013.15 linux-buildinfo-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-azure - 6.8.0-1013.15 linux-headers-6.8.0-1013-azure - 6.8.0-1013.15 linux-headers-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure-fde - 6.8.0-1013.15 linux-image-azure - 6.8.0-1013.15 linux-image-azure-fde - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-azure - 6.8.0-1013.15 linux-modules-involflt-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-involflt-azure - 6.8.0-1013.15 linux-modules-iwlwifi-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-iwlwifi-azure - 6.8.0-1013.15 linux-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-tools-azure - 6.8.0-1013.15 No subscription required linux-aws - 6.8.0-1014.15 linux-aws-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-aws-headers-6.8.0-1014 - 6.8.0-1014.15 linux-aws-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-aws - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-aws - 6.8.0-1014.15 linux-image-6.8.0-1014-aws - 6.8.0-1014.15 linux-image-aws - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-aws - 6.8.0-1014.15 linux-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-tools-aws - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-41-generic - 6.8.0-41.41 linux-buildinfo-6.8.0-41-generic-64k - 6.8.0-41.41 linux-cloud-tools-6.8.0-41 - 6.8.0-41.41 linux-cloud-tools-6.8.0-41-generic - 6.8.0-41.41 linux-cloud-tools-common - 6.8.0-41.41 linux-cloud-tools-generic - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-cloud-tools-virtual - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-crashdump - 6.8.0-41.41 linux-doc - 6.8.0-41.41 linux-generic - 6.8.0-41.41 linux-generic-64k - 6.8.0-41.41 linux-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-generic-hwe-24.04 - 6.8.0-41.41 linux-generic-hwe-24.04-edge - 6.8.0-41.41 linux-generic-lpae - 6.8.0-41.41 linux-headers-6.8.0-41 - 6.8.0-41.41 linux-headers-6.8.0-41-generic - 6.8.0-41.41 linux-headers-6.8.0-41-generic-64k - 6.8.0-41.41 linux-headers-generic - 6.8.0-41.41 linux-headers-generic-64k - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-lpae - 6.8.0-41.41 linux-headers-kvm - 6.8.0-41.41 linux-headers-laptop-23.10 - 6.8.0-41.41 linux-headers-oem-20.04 - 6.8.0-41.41 linux-headers-oem-20.04b - 6.8.0-41.41 linux-headers-oem-20.04c - 6.8.0-41.41 linux-headers-oem-20.04d - 6.8.0-41.41 linux-headers-oem-22.04 - 6.8.0-41.41 linux-headers-virtual - 6.8.0-41.41 linux-headers-virtual-hwe-24.04 - 6.8.0-41.41 linux-headers-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-6.8.0-41-generic - 6.8.0-41.41 linux-image-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-extra-virtual - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic - 6.8.0-41.41 linux-image-generic-64k - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-hwe-24.04 - 6.8.0-41.41 linux-image-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-lpae - 6.8.0-41.41 linux-image-kvm - 6.8.0-41.41 linux-image-laptop-23.10 - 6.8.0-41.41 linux-image-oem-20.04 - 6.8.0-41.41 linux-image-oem-20.04b - 6.8.0-41.41 linux-image-oem-20.04c - 6.8.0-41.41 linux-image-oem-20.04d - 6.8.0-41.41 linux-image-oem-22.04 - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-uc-generic - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04 - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-virtual - 6.8.0-41.41 linux-image-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-kvm - 6.8.0-41.41 linux-laptop-23.10 - 6.8.0-41.41 linux-lib-rust-6.8.0-41-generic - 6.8.0-41.41 linux-libc-dev - 6.8.0-41.41 linux-modules-6.8.0-41-generic - 6.8.0-41.41 linux-modules-6.8.0-41-generic-64k - 6.8.0-41.41 linux-modules-extra-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-generic - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-6.8.0-41-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04 - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04d - 6.8.0-41.41 linux-modules-iwlwifi-oem-22.04 - 6.8.0-41.41 linux-modules-usbio-6.8.0-41-generic - 6.8.0-41.41 linux-modules-usbio-generic - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-41.41 linux-oem-20.04 - 6.8.0-41.41 linux-oem-20.04b - 6.8.0-41.41 linux-oem-20.04c - 6.8.0-41.41 linux-oem-20.04d - 6.8.0-41.41 linux-oem-22.04 - 6.8.0-41.41 linux-source - 6.8.0-41.41 linux-source-6.8.0 - 6.8.0-41.41 linux-tools-6.8.0-41 - 6.8.0-41.41 linux-tools-6.8.0-41-generic - 6.8.0-41.41 linux-tools-6.8.0-41-generic-64k - 6.8.0-41.41 linux-tools-common - 6.8.0-41.41 linux-tools-generic - 6.8.0-41.41 linux-tools-generic-64k - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-lpae - 6.8.0-41.41 linux-tools-host - 6.8.0-41.41 linux-tools-kvm - 6.8.0-41.41 linux-tools-laptop-23.10 - 6.8.0-41.41 linux-tools-oem-20.04 - 6.8.0-41.41 linux-tools-oem-20.04b - 6.8.0-41.41 linux-tools-oem-20.04c - 6.8.0-41.41 linux-tools-oem-20.04d - 6.8.0-41.41 linux-tools-oem-22.04 - 6.8.0-41.41 linux-tools-virtual - 6.8.0-41.41 linux-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-virtual - 6.8.0-41.41 linux-virtual-hwe-24.04 - 6.8.0-41.41 linux-virtual-hwe-24.04-edge - 6.8.0-41.41 No subscription required linux-buildinfo-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-buildinfo-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-cloud-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency - 6.8.0-41.41.1 linux-headers-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency - 6.8.0-41.41.1 linux-image-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency - 6.8.0-41.41.1 linux-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-common - 6.8.0-41.41.1 linux-lowlatency-headers-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-lib-rust-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-lowlatency-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-tools-common - 6.8.0-41.41.1 linux-lowlatency-tools-host - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-modules-iwlwifi-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency - 6.8.0-41.41.1 linux-tools-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 No subscription required Medium CVE-2024-39292 CVE-2024-39484 USN-6977-1 -- QEMU vulnerabilities Ubuntu 24.04 LTS It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26327) It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26328) Update Instructions: Run `sudo pro fix USN-6977-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.2 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.2 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.2 qemu-system - 1:8.2.2+ds-0ubuntu1.2 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.2 qemu-system-common - 1:8.2.2+ds-0ubuntu1.2 qemu-system-data - 1:8.2.2+ds-0ubuntu1.2 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.2 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.2 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.2 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.2 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-user - 1:8.2.2+ds-0ubuntu1.2 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.2 qemu-user-static - 1:8.2.2+ds-0ubuntu1.2 qemu-utils - 1:8.2.2+ds-0ubuntu1.2 No subscription required Medium CVE-2024-26327 CVE-2024-26328 USN-6982-1 -- Dovecot vulnerabilities Ubuntu 24.04 LTS It was discovered that Dovecot did not not properly have restrictions on ithe size of address headers. A remote attacker could possibly use this issue to cause denial of service. (CVE-2024-23184, CVE-2024-23185) Update Instructions: Run `sudo pro fix USN-6982-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dovecot-auth-lua - 1:2.3.21+dfsg1-2ubuntu6 dovecot-core - 1:2.3.21+dfsg1-2ubuntu6 dovecot-dev - 1:2.3.21+dfsg1-2ubuntu6 dovecot-gssapi - 1:2.3.21+dfsg1-2ubuntu6 dovecot-imapd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-ldap - 1:2.3.21+dfsg1-2ubuntu6 dovecot-lmtpd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-managesieved - 1:2.3.21+dfsg1-2ubuntu6 dovecot-mysql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pgsql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pop3d - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sieve - 1:2.3.21+dfsg1-2ubuntu6 dovecot-solr - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sqlite - 1:2.3.21+dfsg1-2ubuntu6 dovecot-submissiond - 1:2.3.21+dfsg1-2ubuntu6 No subscription required Medium CVE-2024-23184 CVE-2024-23185 USN-6983-1 -- FFmpeg vulnerability Ubuntu 24.04 LTS Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during video encoding. An attacker could possibly use this issue to perform a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6983-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm2 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm2 libavcodec-dev - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm2 libavcodec60 - 7:6.1.1-3ubuntu5+esm2 libavdevice-dev - 7:6.1.1-3ubuntu5+esm2 libavdevice60 - 7:6.1.1-3ubuntu5+esm2 libavfilter-dev - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm2 libavfilter9 - 7:6.1.1-3ubuntu5+esm2 libavformat-dev - 7:6.1.1-3ubuntu5+esm2 libavformat-extra - 7:6.1.1-3ubuntu5+esm2 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm2 libavformat60 - 7:6.1.1-3ubuntu5+esm2 libavutil-dev - 7:6.1.1-3ubuntu5+esm2 libavutil58 - 7:6.1.1-3ubuntu5+esm2 libpostproc-dev - 7:6.1.1-3ubuntu5+esm2 libpostproc57 - 7:6.1.1-3ubuntu5+esm2 libswresample-dev - 7:6.1.1-3ubuntu5+esm2 libswresample4 - 7:6.1.1-3ubuntu5+esm2 libswscale-dev - 7:6.1.1-3ubuntu5+esm2 libswscale7 - 7:6.1.1-3ubuntu5+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-32230 USN-6984-1 -- WebOb vulnerability Ubuntu 24.04 LTS It was discovered that WebOb incorrectly handled certain URLs. An attacker could possibly use this issue to control a redirect or forward to another URL. Update Instructions: Run `sudo pro fix USN-6984-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-webob-doc - 1:1.8.7-1ubuntu0.1.24.04.1 python3-webob - 1:1.8.7-1ubuntu0.1.24.04.1 No subscription required Medium CVE-2024-42353 USN-6986-1 -- OpenSSL vulnerability Ubuntu 24.04 LTS David Benjamin discovered that OpenSSL incorrectly handled certain X.509 certificates. An attacker could possible use this issue to cause a denial of service or expose sensitive information. Update Instructions: Run `sudo pro fix USN-6986-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.4 libssl-doc - 3.0.13-0ubuntu3.4 libssl3t64 - 3.0.13-0ubuntu3.4 openssl - 3.0.13-0ubuntu3.4 No subscription required Medium CVE-2024-6119 USN-6987-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231) Update Instructions: Run `sudo pro fix USN-6987-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.3 python3-django - 3:4.2.11-1ubuntu1.3 No subscription required Medium CVE-2024-45230 CVE-2024-45231 USN-6988-1 -- Twisted vulnerabilities Ubuntu 24.04 LTS Ben Kallus discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay and manipulate responses. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-41671) It was discovered that Twisted did not properly sanitize certain input. An attacker could use this vulnerability to possibly execute an HTML injection leading to a cross-site scripting (XSS) attack. (CVE-2024-41810) Update Instructions: Run `sudo pro fix USN-6988-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 24.3.0-1ubuntu0.1 twisted-doc - 24.3.0-1ubuntu0.1 No subscription required Medium CVE-2024-41671 CVE-2024-41810 USN-6989-1 -- OpenStack vulnerability Ubuntu 24.04 LTS Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. Update Instructions: Run `sudo pro fix USN-6989-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ironic-api - 1:24.1.1-0ubuntu1.2 ironic-common - 1:24.1.1-0ubuntu1.2 ironic-conductor - 1:24.1.1-0ubuntu1.2 python3-ironic - 1:24.1.1-0ubuntu1.2 No subscription required Medium CVE-2024-44082 USN-6990-1 -- znc vulnerability Ubuntu 24.04 LTS Johannes Kuhn (DasBrain) discovered that znc incorrectly handled user input under certain operations. An attacker could possibly use this issue to execute arbitrary code on a user's system if the user was tricked into joining a malicious server. Update Instructions: Run `sudo pro fix USN-6990-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: znc-backlog - 0.20180824+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc-push - 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc - 1.9.0-2ubuntu0.1~esm2 znc-dev - 1.9.0-2ubuntu0.1~esm2 znc-perl - 1.9.0-2ubuntu0.1~esm2 znc-python - 1.9.0-2ubuntu0.1~esm2 znc-tcl - 1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-39844 USN-6991-1 -- AIOHTTP vulnerability Ubuntu 24.04 LTS It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system. Update Instructions: Run `sudo pro fix USN-6991-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-aiohttp-doc - 3.9.1-1ubuntu0.1 python3-aiohttp - 3.9.1-1ubuntu0.1 No subscription required Medium CVE-2024-23334 USN-6993-1 -- Vim vulnerabilities Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374) Update Instructions: Run `sudo pro fix USN-6993-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.2 vim-athena - 2:9.1.0016-1ubuntu7.2 vim-common - 2:9.1.0016-1ubuntu7.2 vim-doc - 2:9.1.0016-1ubuntu7.2 vim-gtk3 - 2:9.1.0016-1ubuntu7.2 vim-gui-common - 2:9.1.0016-1ubuntu7.2 vim-motif - 2:9.1.0016-1ubuntu7.2 vim-nox - 2:9.1.0016-1ubuntu7.2 vim-runtime - 2:9.1.0016-1ubuntu7.2 vim-tiny - 2:9.1.0016-1ubuntu7.2 xxd - 2:9.1.0016-1ubuntu7.2 No subscription required Medium CVE-2024-41957 CVE-2024-43374 USN-6996-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6996-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-40776 CVE-2024-40779 CVE-2024-40780 CVE-2024-40782 CVE-2024-40789 CVE-2024-4558 USN-6997-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6997-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-4ubuntu2.2 libtiff-doc - 4.5.1+git230720-4ubuntu2.2 libtiff-opengl - 4.5.1+git230720-4ubuntu2.2 libtiff-tools - 4.5.1+git230720-4ubuntu2.2 libtiff5-dev - 4.5.1+git230720-4ubuntu2.2 libtiff6 - 4.5.1+git230720-4ubuntu2.2 libtiffxx6 - 4.5.1+git230720-4ubuntu2.2 No subscription required Medium CVE-2024-7006 USN-6998-1 -- Unbound vulnerabilities Ubuntu 24.04 LTS It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-43167) It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-43168) Update Instructions: Run `sudo pro fix USN-6998-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.2 libunbound8 - 1.19.2-1ubuntu3.2 python3-unbound - 1.19.2-1ubuntu3.2 unbound - 1.19.2-1ubuntu3.2 unbound-anchor - 1.19.2-1ubuntu3.2 unbound-host - 1.19.2-1ubuntu3.2 No subscription required Medium CVE-2024-43167 CVE-2024-43168 USN-6999-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40911, CVE-2024-37356, CVE-2024-40935, CVE-2024-40944, CVE-2024-41003, CVE-2024-40990, CVE-2024-40952, CVE-2024-40940, CVE-2024-40930, CVE-2024-40985, CVE-2024-40941, CVE-2024-38630, CVE-2024-39466, CVE-2024-40933, CVE-2024-38624, CVE-2024-40924, CVE-2024-40945, CVE-2024-40899, CVE-2024-38622, CVE-2024-40979, CVE-2024-36484, CVE-2024-41004, CVE-2024-39474, CVE-2022-48772, CVE-2024-36244, CVE-2024-38664, CVE-2024-40925, CVE-2024-40980, CVE-2024-39480, CVE-2024-36270, CVE-2024-40936, CVE-2024-40904, CVE-2024-38635, CVE-2024-40927, CVE-2024-36481, CVE-2024-40929, CVE-2024-40958, CVE-2024-36978, CVE-2024-40992, CVE-2024-40908, CVE-2024-39504, CVE-2024-41001, CVE-2024-40967, CVE-2023-52884, CVE-2024-40997, CVE-2024-40903, CVE-2024-40913, CVE-2024-34030, CVE-2024-39473, CVE-2024-40966, CVE-2024-40951, CVE-2024-40902, CVE-2024-40982, CVE-2024-40923, CVE-2024-39467, CVE-2024-40910, CVE-2024-40909, CVE-2024-39463, CVE-2024-40974, CVE-2024-41002, CVE-2024-39464, CVE-2024-39496, CVE-2024-41040, CVE-2024-39469, CVE-2024-39500, CVE-2024-39510, CVE-2024-38627, CVE-2024-32936, CVE-2024-40975, CVE-2024-38390, CVE-2024-40959, CVE-2024-41006, CVE-2024-40986, CVE-2024-40987, CVE-2024-40922, CVE-2024-40983, CVE-2024-37354, CVE-2024-38637, CVE-2024-39277, CVE-2024-40943, CVE-2024-39371, CVE-2024-40921, CVE-2024-40953, CVE-2024-38634, CVE-2024-38659, CVE-2024-39492, CVE-2024-40976, CVE-2024-40906, CVE-2024-40965, CVE-2024-38667, CVE-2024-39498, CVE-2024-38628, CVE-2024-38661, CVE-2024-38663, CVE-2024-40998, CVE-2024-40948, CVE-2024-38306, CVE-2024-40928, CVE-2024-39468, CVE-2024-39494, CVE-2024-39505, CVE-2024-40963, CVE-2024-39499, CVE-2024-39506, CVE-2024-40995, CVE-2024-39491, CVE-2024-40900, CVE-2024-39478, CVE-2024-39490, CVE-2024-39291, CVE-2024-40981, CVE-2024-40926, CVE-2024-40939, CVE-2024-38385, CVE-2024-39483, CVE-2024-40989, CVE-2024-40955, CVE-2024-39501, CVE-2024-38381, CVE-2024-33621, CVE-2024-40964, CVE-2024-42148, CVE-2024-36286, CVE-2024-38629, CVE-2024-39509, CVE-2024-39298, CVE-2024-36489, CVE-2024-34777, CVE-2024-40957, CVE-2024-40919, CVE-2024-39462, CVE-2024-39495, CVE-2024-39497, CVE-2024-38636, CVE-2024-36281, CVE-2024-39479, CVE-2024-40932, CVE-2024-36288, CVE-2024-38623, CVE-2024-40969, CVE-2024-40931, CVE-2024-36971, CVE-2024-40934, CVE-2024-36015, CVE-2024-39485, CVE-2024-40996, CVE-2024-39507, CVE-2024-36973, CVE-2024-38625, CVE-2024-39301, CVE-2024-34027, CVE-2024-37026, CVE-2024-40960, CVE-2024-37078, CVE-2024-40912, CVE-2024-40988, CVE-2024-41005, CVE-2024-39276, CVE-2024-38662, CVE-2024-39502, CVE-2024-36479, CVE-2024-40947, CVE-2024-38780, CVE-2024-38388, CVE-2024-40917, CVE-2024-36974, CVE-2024-40970, CVE-2024-40901, CVE-2024-38384, CVE-2024-39475, CVE-2024-40949, CVE-2024-37021, CVE-2024-38633, CVE-2024-39503, CVE-2024-41000, CVE-2024-33847, CVE-2024-35247, CVE-2024-40968, CVE-2024-33619, CVE-2024-38619, CVE-2024-40984, CVE-2024-36478, CVE-2024-39493, CVE-2024-42078, CVE-2024-40954, CVE-2024-40978, CVE-2024-39508, CVE-2024-40915, CVE-2024-39489, CVE-2024-40920, CVE-2024-38618, CVE-2024-40938, CVE-2024-39296, CVE-2024-40962, CVE-2024-39470, CVE-2024-39481, CVE-2024-40977, CVE-2024-38621, CVE-2024-40971, CVE-2024-31076, CVE-2024-36972, CVE-2024-39471, CVE-2024-40994, CVE-2024-40973, CVE-2024-40916, CVE-2024-40942, CVE-2024-40956, CVE-2024-39465, CVE-2024-40914, CVE-2024-40937, CVE-2024-40918, CVE-2024-40905, CVE-2024-39488, CVE-2024-38632, CVE-2024-39461, CVE-2024-40999, CVE-2024-40972, CVE-2024-36477, CVE-2024-40961) Update Instructions: Run `sudo pro fix USN-6999-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gke - 6.8.0-1010.13 linux-gke - 6.8.0-1010.13 linux-gke-headers-6.8.0-1010 - 6.8.0-1010.13 linux-gke-tools-6.8.0-1010 - 6.8.0-1010.13 linux-headers-6.8.0-1010-gke - 6.8.0-1010.13 linux-headers-gke - 6.8.0-1010.13 linux-image-6.8.0-1010-gke - 6.8.0-1010.13 linux-image-gke - 6.8.0-1010.13 linux-image-unsigned-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-extra-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-gke - 6.8.0-1010.13 linux-tools-6.8.0-1010-gke - 6.8.0-1010.13 linux-tools-gke - 6.8.0-1010.13 No subscription required linux-buildinfo-6.8.0-1012-ibm - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oem - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-6.8.0-1012-ibm - 6.8.0-1012.12 linux-headers-6.8.0-1012-oem - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-ibm - 6.8.0-1012.12 linux-headers-ibm-classic - 6.8.0-1012.12 linux-headers-ibm-lts-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04a - 6.8.0-1012.12 linux-headers-oracle - 6.8.0-1012.12 linux-headers-oracle-64k - 6.8.0-1012.12 linux-ibm - 6.8.0-1012.12 linux-ibm-classic - 6.8.0-1012.12 linux-ibm-cloud-tools-common - 6.8.0-1012.12 linux-ibm-headers-6.8.0-1012 - 6.8.0-1012.12 linux-ibm-lts-24.04 - 6.8.0-1012.12 linux-ibm-source-6.8.0 - 6.8.0-1012.12 linux-ibm-tools-6.8.0-1012 - 6.8.0-1012.12 linux-image-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-image-ibm - 6.8.0-1012.12 linux-image-ibm-classic - 6.8.0-1012.12 linux-image-ibm-lts-24.04 - 6.8.0-1012.12 linux-image-oem-24.04 - 6.8.0-1012.12 linux-image-oem-24.04a - 6.8.0-1012.12 linux-image-oracle - 6.8.0-1012.12 linux-image-oracle-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-uc-oem-24.04 - 6.8.0-1012.12 linux-image-uc-oem-24.04a - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-ipu6-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04 - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-iwlwifi-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-classic - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-oracle - 6.8.0-1012.12 linux-modules-usbio-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-usbio-oem-24.04 - 6.8.0-1012.12 linux-modules-usbio-oem-24.04a - 6.8.0-1012.12 linux-oem-24.04 - 6.8.0-1012.12 linux-oem-24.04a - 6.8.0-1012.12 linux-oem-6.8-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oem-6.8-tools-6.8.0-1012 - 6.8.0-1012.12 linux-oracle - 6.8.0-1012.12 linux-oracle-64k - 6.8.0-1012.12 linux-oracle-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oracle-tools-6.8.0-1012 - 6.8.0-1012.12 linux-tools-6.8.0-1012-ibm - 6.8.0-1012.12 linux-tools-6.8.0-1012-oem - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-tools-ibm - 6.8.0-1012.12 linux-tools-ibm-classic - 6.8.0-1012.12 linux-tools-ibm-lts-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04a - 6.8.0-1012.12 linux-tools-oracle - 6.8.0-1012.12 linux-tools-oracle-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1014-gcp - 6.8.0-1014.16 linux-gcp - 6.8.0-1014.16 linux-gcp-headers-6.8.0-1014 - 6.8.0-1014.16 linux-gcp-tools-6.8.0-1014 - 6.8.0-1014.16 linux-headers-6.8.0-1014-gcp - 6.8.0-1014.16 linux-headers-gcp - 6.8.0-1014.16 linux-image-6.8.0-1014-gcp - 6.8.0-1014.16 linux-image-gcp - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-gcp - 6.8.0-1014.16 linux-tools-6.8.0-1014-gcp - 6.8.0-1014.16 linux-tools-gcp - 6.8.0-1014.16 No subscription required linux-aws - 6.8.0-1015.16 linux-aws-cloud-tools-6.8.0-1015 - 6.8.0-1015.16 linux-aws-headers-6.8.0-1015 - 6.8.0-1015.16 linux-aws-tools-6.8.0-1015 - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-aws - 6.8.0-1015.16 linux-cloud-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-aws - 6.8.0-1015.16 linux-image-6.8.0-1015-aws - 6.8.0-1015.16 linux-image-aws - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-aws - 6.8.0-1015.16 linux-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-tools-aws - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-44-generic - 6.8.0-44.44 linux-buildinfo-6.8.0-44-generic-64k - 6.8.0-44.44 linux-cloud-tools-6.8.0-44 - 6.8.0-44.44 linux-cloud-tools-6.8.0-44-generic - 6.8.0-44.44 linux-cloud-tools-common - 6.8.0-44.44 linux-cloud-tools-generic - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-cloud-tools-virtual - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-crashdump - 6.8.0-44.44 linux-doc - 6.8.0-44.44 linux-generic - 6.8.0-44.44 linux-generic-64k - 6.8.0-44.44 linux-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-generic-hwe-24.04 - 6.8.0-44.44 linux-generic-hwe-24.04-edge - 6.8.0-44.44 linux-generic-lpae - 6.8.0-44.44 linux-headers-6.8.0-44 - 6.8.0-44.44 linux-headers-6.8.0-44-generic - 6.8.0-44.44 linux-headers-6.8.0-44-generic-64k - 6.8.0-44.44 linux-headers-generic - 6.8.0-44.44 linux-headers-generic-64k - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-lpae - 6.8.0-44.44 linux-headers-kvm - 6.8.0-44.44 linux-headers-laptop-23.10 - 6.8.0-44.44 linux-headers-oem-20.04 - 6.8.0-44.44 linux-headers-oem-20.04b - 6.8.0-44.44 linux-headers-oem-20.04c - 6.8.0-44.44 linux-headers-oem-20.04d - 6.8.0-44.44 linux-headers-oem-22.04 - 6.8.0-44.44 linux-headers-virtual - 6.8.0-44.44 linux-headers-virtual-hwe-24.04 - 6.8.0-44.44 linux-headers-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-6.8.0-44-generic - 6.8.0-44.44 linux-image-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-extra-virtual - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic - 6.8.0-44.44 linux-image-generic-64k - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-hwe-24.04 - 6.8.0-44.44 linux-image-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-lpae - 6.8.0-44.44 linux-image-kvm - 6.8.0-44.44 linux-image-laptop-23.10 - 6.8.0-44.44 linux-image-oem-20.04 - 6.8.0-44.44 linux-image-oem-20.04b - 6.8.0-44.44 linux-image-oem-20.04c - 6.8.0-44.44 linux-image-oem-20.04d - 6.8.0-44.44 linux-image-oem-22.04 - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-uc-generic - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04 - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-virtual - 6.8.0-44.44 linux-image-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-kvm - 6.8.0-44.44 linux-laptop-23.10 - 6.8.0-44.44 linux-lib-rust-6.8.0-44-generic - 6.8.0-44.44 linux-libc-dev - 6.8.0-44.44 linux-modules-6.8.0-44-generic - 6.8.0-44.44 linux-modules-6.8.0-44-generic-64k - 6.8.0-44.44 linux-modules-extra-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-generic - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-6.8.0-44-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04 - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04d - 6.8.0-44.44 linux-modules-iwlwifi-oem-22.04 - 6.8.0-44.44 linux-modules-usbio-6.8.0-44-generic - 6.8.0-44.44 linux-modules-usbio-generic - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-44.44 linux-oem-20.04 - 6.8.0-44.44 linux-oem-20.04b - 6.8.0-44.44 linux-oem-20.04c - 6.8.0-44.44 linux-oem-20.04d - 6.8.0-44.44 linux-oem-22.04 - 6.8.0-44.44 linux-source - 6.8.0-44.44 linux-source-6.8.0 - 6.8.0-44.44 linux-tools-6.8.0-44 - 6.8.0-44.44 linux-tools-6.8.0-44-generic - 6.8.0-44.44 linux-tools-6.8.0-44-generic-64k - 6.8.0-44.44 linux-tools-common - 6.8.0-44.44 linux-tools-generic - 6.8.0-44.44 linux-tools-generic-64k - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-lpae - 6.8.0-44.44 linux-tools-host - 6.8.0-44.44 linux-tools-kvm - 6.8.0-44.44 linux-tools-laptop-23.10 - 6.8.0-44.44 linux-tools-oem-20.04 - 6.8.0-44.44 linux-tools-oem-20.04b - 6.8.0-44.44 linux-tools-oem-20.04c - 6.8.0-44.44 linux-tools-oem-20.04d - 6.8.0-44.44 linux-tools-oem-22.04 - 6.8.0-44.44 linux-tools-virtual - 6.8.0-44.44 linux-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-virtual - 6.8.0-44.44 linux-virtual-hwe-24.04 - 6.8.0-44.44 linux-virtual-hwe-24.04-edge - 6.8.0-44.44 No subscription required linux-buildinfo-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-buildinfo-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-cloud-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency - 6.8.0-44.44.1 linux-headers-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency - 6.8.0-44.44.1 linux-image-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency - 6.8.0-44.44.1 linux-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-common - 6.8.0-44.44.1 linux-lowlatency-headers-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-lib-rust-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-lowlatency-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-tools-common - 6.8.0-44.44.1 linux-lowlatency-tools-host - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-modules-iwlwifi-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency - 6.8.0-44.44.1 linux-tools-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-6999-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40978, CVE-2024-39504, CVE-2024-39483, CVE-2024-36478, CVE-2024-40928, CVE-2024-36971, CVE-2024-40947, CVE-2024-31076, CVE-2024-40934, CVE-2024-40909, CVE-2024-40962, CVE-2024-38635, CVE-2024-38632, CVE-2024-40912, CVE-2024-40967, CVE-2024-39492, CVE-2024-40974, CVE-2024-39466, CVE-2024-40939, CVE-2024-40988, CVE-2024-40951, CVE-2024-41005, CVE-2024-40968, CVE-2024-39493, CVE-2024-40949, CVE-2022-48772, CVE-2024-40944, CVE-2024-40998, CVE-2024-39490, CVE-2024-39467, CVE-2024-42078, CVE-2024-40953, CVE-2024-40990, CVE-2024-40902, CVE-2024-39461, CVE-2024-39301, CVE-2024-36978, CVE-2024-39475, CVE-2024-39496, CVE-2024-40901, CVE-2024-40985, CVE-2024-33621, CVE-2024-38663, CVE-2024-39497, CVE-2024-40937, CVE-2024-40941, CVE-2024-40987, CVE-2024-40918, CVE-2024-32936, CVE-2024-40999, CVE-2024-40938, CVE-2024-39488, CVE-2024-39510, CVE-2024-40924, CVE-2024-38661, CVE-2024-40989, CVE-2024-39509, CVE-2024-40983, CVE-2024-39471, CVE-2024-39502, CVE-2024-39508, CVE-2024-39371, CVE-2024-40982, CVE-2024-40910, CVE-2024-40903, CVE-2024-39296, CVE-2024-39507, CVE-2024-40906, CVE-2024-37354, CVE-2024-40905, CVE-2024-34027, CVE-2024-38618, CVE-2024-40900, CVE-2024-39469, CVE-2024-38662, CVE-2024-35247, CVE-2024-40922, CVE-2024-40926, CVE-2024-39503, CVE-2024-40899, CVE-2024-40977, CVE-2024-38634, CVE-2024-40933, CVE-2024-40992, CVE-2024-40904, CVE-2024-36479, CVE-2024-40996, CVE-2024-40957, CVE-2024-40931, CVE-2024-39291, CVE-2024-38780, CVE-2024-39277, CVE-2024-38628, CVE-2024-40932, CVE-2024-41004, CVE-2024-33847, CVE-2024-40972, CVE-2024-40945, CVE-2023-52884, CVE-2024-38664, CVE-2024-39462, CVE-2024-40965, CVE-2024-38388, CVE-2024-40916, CVE-2024-36489, CVE-2024-40975, CVE-2024-40942, CVE-2024-40995, CVE-2024-40997, CVE-2024-38385, CVE-2024-40911, CVE-2024-39474, CVE-2024-39470, CVE-2024-41000, CVE-2024-36015, CVE-2024-38633, CVE-2024-40943, CVE-2024-39489, CVE-2024-36477, CVE-2024-39491, CVE-2024-40919, CVE-2024-40914, CVE-2024-40966, CVE-2024-41002, CVE-2024-40960, CVE-2024-38624, CVE-2024-40964, CVE-2024-40936, CVE-2024-40913, CVE-2024-40955, CVE-2024-37026, CVE-2024-38384, CVE-2024-37078, CVE-2024-36244, CVE-2024-38622, CVE-2024-39485, CVE-2024-39479, CVE-2024-39505, CVE-2024-36973, CVE-2024-39498, CVE-2024-40908, CVE-2024-37356, CVE-2024-39480, CVE-2024-38381, CVE-2024-40940, CVE-2024-40980, CVE-2024-39276, CVE-2024-39499, CVE-2024-36484, CVE-2024-38636, CVE-2024-38390, CVE-2024-38619, CVE-2024-39478, CVE-2024-40959, CVE-2024-36288, CVE-2024-40935, CVE-2024-41006, CVE-2024-38625, CVE-2024-36972, CVE-2024-39298, CVE-2024-39468, CVE-2024-40970, CVE-2024-37021, CVE-2024-40981, CVE-2024-40921, CVE-2024-34777, CVE-2024-39500, CVE-2024-40927, CVE-2024-40979, CVE-2024-38627, CVE-2024-39501, CVE-2024-39481, CVE-2024-40917, CVE-2024-40956, CVE-2024-42148, CVE-2024-36481, CVE-2024-40925, CVE-2024-40986, CVE-2024-40948, CVE-2024-41003, CVE-2024-39506, CVE-2024-40952, CVE-2024-38306, CVE-2024-40971, CVE-2024-41001, CVE-2024-40973, CVE-2024-36281, CVE-2024-40923, CVE-2024-39473, CVE-2024-38637, CVE-2024-40984, CVE-2024-39463, CVE-2024-41040, CVE-2024-38623, CVE-2024-40954, CVE-2024-36286, CVE-2024-38667, CVE-2024-39465, CVE-2024-40915, CVE-2024-33619, CVE-2024-40920, CVE-2024-40969, CVE-2024-38659, CVE-2024-34030, CVE-2024-38630, CVE-2024-40976, CVE-2024-36974, CVE-2024-40930, CVE-2024-39464, CVE-2024-38621, CVE-2024-40958, CVE-2024-40994, CVE-2024-39494, CVE-2024-40961, CVE-2024-39495, CVE-2024-40963, CVE-2024-36270, CVE-2024-38629, CVE-2024-40929) Update Instructions: Run `sudo pro fix USN-6999-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-raspi - 6.8.0-1011.12 linux-image-6.8.0-1011-raspi - 6.8.0-1011.12 linux-image-raspi - 6.8.0-1011.12 linux-modules-6.8.0-1011-raspi - 6.8.0-1011.12 linux-raspi - 6.8.0-1011.12 linux-raspi-headers-6.8.0-1011 - 6.8.0-1011.12 linux-raspi-tools-6.8.0-1011 - 6.8.0-1011.12 linux-tools-6.8.0-1011-raspi - 6.8.0-1011.12 linux-tools-raspi - 6.8.0-1011.12 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7000-1 -- Expat vulnerabilities Ubuntu 24.04 LTS Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491, CVE-2024-45492) Update Instructions: Run `sudo pro fix USN-7000-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.1 libexpat1 - 2.6.1-2ubuntu0.1 libexpat1-dev - 2.6.1-2ubuntu0.1 No subscription required Medium CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 USN-7001-2 -- xmltok library vulnerabilities Ubuntu 24.04 LTS USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491) Update Instructions: Run `sudo pro fix USN-7001-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm1 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-45490 CVE-2024-45491 USN-7002-1 -- Setuptools vulnerability Ubuntu 24.04 LTS It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7002-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.1 python3-pkg-resources - 68.1.2-2ubuntu1.1 python3-setuptools - 68.1.2-2ubuntu1.1 python3-setuptools-whl - 68.1.2-2ubuntu1.1 No subscription required Medium CVE-2024-6345 USN-7004-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-36270, CVE-2024-38627, CVE-2024-39508, CVE-2024-41001, CVE-2024-38634, CVE-2024-40979, CVE-2024-40903, CVE-2024-34030, CVE-2024-38621, CVE-2024-34027, CVE-2024-39504, CVE-2024-38385, CVE-2024-36288, CVE-2024-39301, CVE-2024-38628, CVE-2024-42270, CVE-2024-39507, CVE-2024-36286, CVE-2024-40960, CVE-2024-36479, CVE-2024-41002, CVE-2024-36974, CVE-2024-40943, CVE-2024-40976, CVE-2024-38662, CVE-2024-40995, CVE-2024-39497, CVE-2024-31076, CVE-2024-39371, CVE-2024-40983, CVE-2024-40985, CVE-2024-38618, CVE-2024-40914, CVE-2024-40989, CVE-2024-40973, CVE-2024-38663, CVE-2024-39463, CVE-2024-38633, CVE-2024-36978, CVE-2024-40970, CVE-2024-40932, CVE-2024-39480, CVE-2024-39471, CVE-2024-40962, CVE-2024-40986, CVE-2024-40937, CVE-2024-39469, CVE-2024-40904, CVE-2024-39466, CVE-2024-38388, CVE-2024-39494, CVE-2024-41004, CVE-2024-38381, CVE-2022-48772, CVE-2024-33847, CVE-2024-40969, CVE-2024-40957, CVE-2024-40933, CVE-2024-37354, CVE-2024-39468, CVE-2024-40917, CVE-2024-38623, CVE-2024-40958, CVE-2024-39502, CVE-2024-38384, CVE-2024-39506, CVE-2024-40940, CVE-2024-34777, CVE-2024-41005, CVE-2024-39470, CVE-2024-39464, CVE-2024-39492, CVE-2024-38629, CVE-2024-39505, CVE-2024-40952, CVE-2024-40941, CVE-2024-39474, CVE-2024-38664, CVE-2024-40929, CVE-2024-39489, CVE-2024-40953, CVE-2024-40916, CVE-2024-40911, CVE-2024-32936, CVE-2024-40934, CVE-2024-37078, CVE-2024-39483, CVE-2024-40967, CVE-2024-40924, CVE-2024-39462, CVE-2024-40981, CVE-2024-36281, CVE-2024-39291, CVE-2024-39481, CVE-2024-40978, CVE-2024-38622, CVE-2024-39503, CVE-2024-40956, CVE-2023-52884, CVE-2024-39498, CVE-2024-38661, CVE-2024-40918, CVE-2024-39479, CVE-2024-40915, CVE-2024-39501, CVE-2024-39488, CVE-2024-40925, CVE-2024-40930, CVE-2024-40961, CVE-2024-40951, CVE-2024-38636, CVE-2024-39491, CVE-2024-39495, CVE-2024-39509, CVE-2024-40947, CVE-2024-36477, CVE-2024-36478, CVE-2024-42148, CVE-2024-39473, CVE-2024-39510, CVE-2024-40923, CVE-2024-38624, CVE-2024-38659, CVE-2024-36971, CVE-2024-38625, CVE-2024-40913, CVE-2024-35247, CVE-2024-36481, CVE-2024-36484, CVE-2024-40928, CVE-2024-40927, CVE-2024-40944, CVE-2024-39485, CVE-2024-36244, CVE-2024-40910, CVE-2024-40945, CVE-2024-33621, CVE-2024-38667, CVE-2024-40992, CVE-2024-40908, CVE-2024-40901, CVE-2024-40906, CVE-2024-38390, CVE-2024-40900, CVE-2024-41006, CVE-2024-40968, CVE-2024-40966, CVE-2024-40977, CVE-2024-33619, CVE-2024-39496, CVE-2024-38630, CVE-2024-40920, CVE-2024-39499, CVE-2024-40899, CVE-2024-41003, CVE-2024-40964, CVE-2024-40922, CVE-2024-38632, CVE-2024-40931, CVE-2024-40982, CVE-2024-40971, CVE-2024-39277, CVE-2024-39467, CVE-2024-36015, CVE-2024-40954, CVE-2024-40938, CVE-2024-40921, CVE-2024-39296, CVE-2024-41040, CVE-2024-40965, CVE-2024-39465, CVE-2024-40984, CVE-2024-39478, CVE-2024-40990, CVE-2024-40926, CVE-2024-40980, CVE-2024-40905, CVE-2024-39475, CVE-2024-40959, CVE-2024-40902, CVE-2024-38780, CVE-2024-40935, CVE-2024-37021, CVE-2024-40997, CVE-2024-40936, CVE-2024-40987, CVE-2024-40939, CVE-2024-37026, CVE-2024-36973, CVE-2024-40972, CVE-2024-42078, CVE-2024-38306, CVE-2024-40949, CVE-2024-36489, CVE-2024-38637, CVE-2024-40912, CVE-2024-39276, CVE-2024-39493, CVE-2024-40994, CVE-2024-40948, CVE-2024-36972, CVE-2024-40942, CVE-2024-37356, CVE-2024-38619, CVE-2024-40988, CVE-2024-38635, CVE-2024-41000, CVE-2024-40955, CVE-2024-40999, CVE-2024-40974, CVE-2024-39490, CVE-2024-39298, CVE-2024-40975, CVE-2024-40998, CVE-2024-40996, CVE-2024-40963, CVE-2024-40909, CVE-2024-40919, CVE-2024-39500, CVE-2024-39461) Update Instructions: Run `sudo pro fix USN-7004-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1014.16 linux-azure-cloud-tools-6.8.0-1014 - 6.8.0-1014.16 linux-azure-fde - 6.8.0-1014.16 linux-azure-headers-6.8.0-1014 - 6.8.0-1014.16 linux-azure-tools-6.8.0-1014 - 6.8.0-1014.16 linux-buildinfo-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-azure - 6.8.0-1014.16 linux-headers-6.8.0-1014-azure - 6.8.0-1014.16 linux-headers-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure-fde - 6.8.0-1014.16 linux-image-azure - 6.8.0-1014.16 linux-image-azure-fde - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-azure - 6.8.0-1014.16 linux-modules-involflt-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-involflt-azure - 6.8.0-1014.16 linux-modules-iwlwifi-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-iwlwifi-azure - 6.8.0-1014.16 linux-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-tools-azure - 6.8.0-1014.16 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 CVE-2024-42270 USN-7005-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40963, CVE-2024-40994, CVE-2024-36481, CVE-2024-39301, CVE-2024-38390, CVE-2024-40976, CVE-2024-40934, CVE-2024-40902, CVE-2024-40916, CVE-2024-39298, CVE-2024-38659, CVE-2024-38384, CVE-2024-38635, CVE-2024-39494, CVE-2024-40926, CVE-2024-40956, CVE-2024-40948, CVE-2024-40920, CVE-2024-38624, CVE-2024-39498, CVE-2024-38780, CVE-2024-39503, CVE-2024-40919, CVE-2024-39505, CVE-2024-40988, CVE-2024-36972, CVE-2024-36974, CVE-2024-39495, CVE-2024-40992, CVE-2024-36015, CVE-2024-38618, CVE-2024-39478, CVE-2024-40975, CVE-2024-39507, CVE-2024-39479, CVE-2024-39291, CVE-2024-40925, CVE-2024-39493, CVE-2024-41005, CVE-2024-40932, CVE-2024-39467, CVE-2024-40973, CVE-2024-38634, CVE-2024-34027, CVE-2024-39462, CVE-2024-40949, CVE-2024-40908, CVE-2024-40929, CVE-2024-38662, CVE-2024-39489, CVE-2024-40953, CVE-2024-38306, CVE-2024-40915, CVE-2024-39470, CVE-2024-40969, CVE-2024-31076, CVE-2024-38663, CVE-2024-38629, CVE-2024-38633, CVE-2024-40959, CVE-2024-39475, CVE-2024-40947, CVE-2024-40971, CVE-2024-40979, CVE-2024-40996, CVE-2024-36484, CVE-2024-40960, CVE-2022-48772, CVE-2024-33619, CVE-2024-40923, CVE-2024-41006, CVE-2024-39474, CVE-2024-40944, CVE-2024-39473, CVE-2024-39469, CVE-2024-40914, CVE-2024-40900, CVE-2023-52884, CVE-2024-40931, CVE-2024-38664, CVE-2024-41004, CVE-2024-38636, CVE-2024-41001, CVE-2024-39497, CVE-2024-40974, CVE-2024-42078, CVE-2024-40954, CVE-2024-39483, CVE-2024-40978, CVE-2024-40952, CVE-2024-39481, CVE-2024-40955, CVE-2024-39471, CVE-2024-41000, CVE-2024-40972, CVE-2024-40957, CVE-2024-40913, CVE-2024-36478, CVE-2024-40984, CVE-2024-40990, CVE-2024-39510, CVE-2024-38381, CVE-2024-39277, CVE-2024-39464, CVE-2024-40995, CVE-2024-40905, CVE-2024-40986, CVE-2024-36971, CVE-2024-39480, CVE-2024-40938, CVE-2024-39509, CVE-2024-40982, CVE-2024-39500, CVE-2024-37026, CVE-2024-40965, CVE-2024-40961, CVE-2024-40989, CVE-2024-36973, CVE-2024-39504, CVE-2024-37354, CVE-2024-39488, CVE-2024-38661, CVE-2024-40998, CVE-2024-36489, CVE-2024-37021, CVE-2024-40917, CVE-2024-36281, CVE-2024-40964, CVE-2024-39496, CVE-2024-40980, CVE-2024-39465, CVE-2024-40983, CVE-2024-40936, CVE-2024-40899, CVE-2024-40933, CVE-2024-36288, CVE-2024-36286, CVE-2024-40987, CVE-2024-40939, CVE-2024-38667, CVE-2024-38628, CVE-2024-40977, CVE-2024-39276, CVE-2024-40941, CVE-2024-39491, CVE-2024-37078, CVE-2024-36978, CVE-2024-38623, CVE-2024-40962, CVE-2024-40935, CVE-2024-40997, CVE-2024-40981, CVE-2024-40922, CVE-2024-39461, CVE-2024-40999, CVE-2024-40918, CVE-2024-40927, CVE-2024-42148, CVE-2024-39371, CVE-2024-40985, CVE-2024-34030, CVE-2024-39485, CVE-2024-39296, CVE-2024-39466, CVE-2024-40909, CVE-2024-39492, CVE-2024-39502, CVE-2024-40903, CVE-2024-41040, CVE-2024-40968, CVE-2024-41003, CVE-2024-39499, CVE-2024-39508, CVE-2024-34777, CVE-2024-38627, CVE-2024-40930, CVE-2024-38388, CVE-2024-39490, CVE-2024-40906, CVE-2024-40940, CVE-2024-40937, CVE-2024-40911, CVE-2024-38385, CVE-2024-36244, CVE-2024-38622, CVE-2024-40958, CVE-2024-41002, CVE-2024-38621, CVE-2024-40970, CVE-2024-40904, CVE-2024-40928, CVE-2024-40967, CVE-2024-40951, CVE-2024-38637, CVE-2024-37356, CVE-2024-39463, CVE-2024-40912, CVE-2024-33847, CVE-2024-39468, CVE-2024-40942, CVE-2024-40910, CVE-2024-38625, CVE-2024-35247, CVE-2024-36479, CVE-2024-40943, CVE-2024-32936, CVE-2024-38630, CVE-2024-39501, CVE-2024-40966, CVE-2024-40921, CVE-2024-40924, CVE-2024-39506, CVE-2024-36270, CVE-2024-33621, CVE-2024-40945, CVE-2024-40901, CVE-2024-38632, CVE-2024-38619) Update Instructions: Run `sudo pro fix USN-7005-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-cloud-tools-nvidia - 6.8.0-1013.13 linux-headers-nvidia - 6.8.0-1013.13 linux-headers-nvidia-64k - 6.8.0-1013.13 linux-image-nvidia - 6.8.0-1013.13 linux-image-nvidia-64k - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1013.13 linux-nvidia - 6.8.0-1013.13 linux-nvidia-64k - 6.8.0-1013.13 linux-tools-nvidia - 6.8.0-1013.13 linux-tools-nvidia-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-nvidia-headers-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-host - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-extra-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency - 6.8.0-1013.14.1 linux-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency-headers-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1013.14.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7010-1 -- DCMTK vulnerabilities Ubuntu 24.04 LTS Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-43272) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-28130) It was discovered that DCMTK incorrectly handled memory when processing an invalid incoming DIMSE message. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-34508, CVE-2024-34509) Update Instructions: Run `sudo pro fix USN-7010-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dcmtk - 3.6.7-9.1ubuntu0.1~esm1 dcmtk-doc - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk-dev - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk17t64 - 3.6.7-9.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-41687 CVE-2021-41688 CVE-2021-41689 CVE-2021-41690 CVE-2022-2121 CVE-2022-43272 CVE-2024-28130 CVE-2024-34508 CVE-2024-34509 USN-7011-1 -- ClamAV vulnerabilities Ubuntu 24.04 LTS It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20505) It was discovered that ClamAV incorrectly handled logfile privileges. A local attacker could use this issue to cause ClamAV to overwrite arbitrary files, possibly leading to privilege escalation. (CVE-2024-20506) Update Instructions: Run `sudo pro fix USN-7011-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.7+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.7+dfsg-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20505 CVE-2024-20506 USN-7012-1 -- curl vulnerability Ubuntu 24.04 LTS Hiroki Kurosawa discovered that curl incorrectly handled certain OCSP responses. This could result in bad certificates not being checked properly, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7012-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.4 libcurl3t64-gnutls - 8.5.0-2ubuntu10.4 libcurl4-doc - 8.5.0-2ubuntu10.4 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.4 libcurl4-openssl-dev - 8.5.0-2ubuntu10.4 libcurl4t64 - 8.5.0-2ubuntu10.4 No subscription required Medium CVE-2024-8096 USN-7014-1 -- nginx vulnerability Ubuntu 24.04 LTS It was discovered that the nginx ngx_http_mp4 module incorrectly handled certain malformed mp4 files. In environments where the mp4 directive is in use, a remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7014-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.1 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.1 libnginx-mod-http-perl - 1.24.0-2ubuntu7.1 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.1 libnginx-mod-mail - 1.24.0-2ubuntu7.1 libnginx-mod-stream - 1.24.0-2ubuntu7.1 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.1 nginx - 1.24.0-2ubuntu7.1 nginx-common - 1.24.0-2ubuntu7.1 nginx-core - 1.24.0-2ubuntu7.1 nginx-dev - 1.24.0-2ubuntu7.1 nginx-doc - 1.24.0-2ubuntu7.1 nginx-extras - 1.24.0-2ubuntu7.1 nginx-full - 1.24.0-2ubuntu7.1 nginx-light - 1.24.0-2ubuntu7.1 No subscription required Medium CVE-2024-7347 USN-7015-1 -- Python vulnerabilities Ubuntu 24.04 LTS It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043) It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232) It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923) It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592) It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088) Update Instructions: Run `sudo pro fix USN-7015-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.2 libpython3.12-dev - 3.12.3-1ubuntu0.2 libpython3.12-minimal - 3.12.3-1ubuntu0.2 libpython3.12-stdlib - 3.12.3-1ubuntu0.2 libpython3.12-testsuite - 3.12.3-1ubuntu0.2 libpython3.12t64 - 3.12.3-1ubuntu0.2 python3.12 - 3.12.3-1ubuntu0.2 python3.12-dev - 3.12.3-1ubuntu0.2 python3.12-doc - 3.12.3-1ubuntu0.2 python3.12-examples - 3.12.3-1ubuntu0.2 python3.12-full - 3.12.3-1ubuntu0.2 python3.12-minimal - 3.12.3-1ubuntu0.2 python3.12-nopie - 3.12.3-1ubuntu0.2 python3.12-venv - 3.12.3-1ubuntu0.2 No subscription required Medium CVE-2023-27043 CVE-2024-6232 CVE-2024-6923 CVE-2024-7592 CVE-2024-8088 USN-7016-1 -- FRR vulnerability Ubuntu 24.04 LTS Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7016-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.2 frr-doc - 8.4.4-1.1ubuntu6.2 frr-pythontools - 8.4.4-1.1ubuntu6.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.2 frr-snmp - 8.4.4-1.1ubuntu6.2 No subscription required Medium CVE-2024-44070 USN-7020-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gke - 6.8.0-1011.14 linux-gke - 6.8.0-1011.14 linux-gke-headers-6.8.0-1011 - 6.8.0-1011.14 linux-gke-tools-6.8.0-1011 - 6.8.0-1011.14 linux-headers-6.8.0-1011-gke - 6.8.0-1011.14 linux-headers-gke - 6.8.0-1011.14 linux-image-6.8.0-1011-gke - 6.8.0-1011.14 linux-image-gke - 6.8.0-1011.14 linux-image-unsigned-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-extra-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-gke - 6.8.0-1011.14 linux-tools-6.8.0-1011-gke - 6.8.0-1011.14 linux-tools-gke - 6.8.0-1011.14 No subscription required linux-buildinfo-6.8.0-1013-ibm - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oem - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-6.8.0-1013-ibm - 6.8.0-1013.13 linux-headers-6.8.0-1013-oem - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-ibm - 6.8.0-1013.13 linux-headers-ibm-classic - 6.8.0-1013.13 linux-headers-ibm-lts-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04a - 6.8.0-1013.13 linux-headers-oracle - 6.8.0-1013.13 linux-headers-oracle-64k - 6.8.0-1013.13 linux-ibm - 6.8.0-1013.13 linux-ibm-classic - 6.8.0-1013.13 linux-ibm-cloud-tools-common - 6.8.0-1013.13 linux-ibm-headers-6.8.0-1013 - 6.8.0-1013.13 linux-ibm-lts-24.04 - 6.8.0-1013.13 linux-ibm-source-6.8.0 - 6.8.0-1013.13 linux-ibm-tools-6.8.0-1013 - 6.8.0-1013.13 linux-image-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-image-ibm - 6.8.0-1013.13 linux-image-ibm-classic - 6.8.0-1013.13 linux-image-ibm-lts-24.04 - 6.8.0-1013.13 linux-image-oem-24.04 - 6.8.0-1013.13 linux-image-oem-24.04a - 6.8.0-1013.13 linux-image-oracle - 6.8.0-1013.13 linux-image-oracle-64k - 6.8.0-1013.13 linux-image-uc-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-uc-oem-24.04 - 6.8.0-1013.13 linux-image-uc-oem-24.04a - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-ipu6-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04 - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04a - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-iwlwifi-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-classic - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1013.13 linux-modules-usbio-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-usbio-oem-24.04 - 6.8.0-1013.13 linux-modules-usbio-oem-24.04a - 6.8.0-1013.13 linux-oem-24.04 - 6.8.0-1013.13 linux-oem-24.04a - 6.8.0-1013.13 linux-oem-6.8-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oem-6.8-tools-6.8.0-1013 - 6.8.0-1013.13 linux-oracle - 6.8.0-1013.13 linux-oracle-64k - 6.8.0-1013.13 linux-oracle-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oracle-tools-6.8.0-1013 - 6.8.0-1013.13 linux-tools-6.8.0-1013-ibm - 6.8.0-1013.13 linux-tools-6.8.0-1013-oem - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-tools-ibm - 6.8.0-1013.13 linux-tools-ibm-classic - 6.8.0-1013.13 linux-tools-ibm-lts-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04a - 6.8.0-1013.13 linux-tools-oracle - 6.8.0-1013.13 linux-tools-oracle-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-cloud-tools-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-headers-nvidia - 6.8.0-1014.15 linux-headers-nvidia-64k - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-nvidia - 6.8.0-1014.15 linux-image-nvidia-64k - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1014.15 linux-nvidia - 6.8.0-1014.15 linux-nvidia-64k - 6.8.0-1014.15 linux-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-host - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-tools-nvidia - 6.8.0-1014.15 linux-tools-nvidia-64k - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-buildinfo-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-extra-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency - 6.8.0-1014.15.1 linux-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency-headers-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1014.15.1 No subscription required linux-buildinfo-6.8.0-1015-gcp - 6.8.0-1015.17 linux-gcp - 6.8.0-1015.17 linux-gcp-headers-6.8.0-1015 - 6.8.0-1015.17 linux-gcp-tools-6.8.0-1015 - 6.8.0-1015.17 linux-headers-6.8.0-1015-gcp - 6.8.0-1015.17 linux-headers-gcp - 6.8.0-1015.17 linux-image-6.8.0-1015-gcp - 6.8.0-1015.17 linux-image-gcp - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-gcp - 6.8.0-1015.17 linux-tools-6.8.0-1015-gcp - 6.8.0-1015.17 linux-tools-gcp - 6.8.0-1015.17 No subscription required linux-aws - 6.8.0-1016.17 linux-aws-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-aws-headers-6.8.0-1016 - 6.8.0-1016.17 linux-aws-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-aws - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-aws - 6.8.0-1016.17 linux-image-6.8.0-1016-aws - 6.8.0-1016.17 linux-image-aws - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-aws - 6.8.0-1016.17 linux-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-tools-aws - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-45-generic - 6.8.0-45.45 linux-buildinfo-6.8.0-45-generic-64k - 6.8.0-45.45 linux-cloud-tools-6.8.0-45 - 6.8.0-45.45 linux-cloud-tools-6.8.0-45-generic - 6.8.0-45.45 linux-cloud-tools-common - 6.8.0-45.45 linux-cloud-tools-generic - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-cloud-tools-virtual - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-crashdump - 6.8.0-45.45 linux-doc - 6.8.0-45.45 linux-generic - 6.8.0-45.45 linux-generic-64k - 6.8.0-45.45 linux-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-generic-hwe-24.04 - 6.8.0-45.45 linux-generic-hwe-24.04-edge - 6.8.0-45.45 linux-generic-lpae - 6.8.0-45.45 linux-headers-6.8.0-45 - 6.8.0-45.45 linux-headers-6.8.0-45-generic - 6.8.0-45.45 linux-headers-6.8.0-45-generic-64k - 6.8.0-45.45 linux-headers-generic - 6.8.0-45.45 linux-headers-generic-64k - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-lpae - 6.8.0-45.45 linux-headers-kvm - 6.8.0-45.45 linux-headers-laptop-23.10 - 6.8.0-45.45 linux-headers-oem-20.04 - 6.8.0-45.45 linux-headers-oem-20.04b - 6.8.0-45.45 linux-headers-oem-20.04c - 6.8.0-45.45 linux-headers-oem-20.04d - 6.8.0-45.45 linux-headers-oem-22.04 - 6.8.0-45.45 linux-headers-virtual - 6.8.0-45.45 linux-headers-virtual-hwe-24.04 - 6.8.0-45.45 linux-headers-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-6.8.0-45-generic - 6.8.0-45.45 linux-image-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-extra-virtual - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic - 6.8.0-45.45 linux-image-generic-64k - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-hwe-24.04 - 6.8.0-45.45 linux-image-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-lpae - 6.8.0-45.45 linux-image-kvm - 6.8.0-45.45 linux-image-laptop-23.10 - 6.8.0-45.45 linux-image-oem-20.04 - 6.8.0-45.45 linux-image-oem-20.04b - 6.8.0-45.45 linux-image-oem-20.04c - 6.8.0-45.45 linux-image-oem-20.04d - 6.8.0-45.45 linux-image-oem-22.04 - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-uc-generic - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04 - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-virtual - 6.8.0-45.45 linux-image-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-kvm - 6.8.0-45.45 linux-laptop-23.10 - 6.8.0-45.45 linux-lib-rust-6.8.0-45-generic - 6.8.0-45.45 linux-libc-dev - 6.8.0-45.45 linux-modules-6.8.0-45-generic - 6.8.0-45.45 linux-modules-6.8.0-45-generic-64k - 6.8.0-45.45 linux-modules-extra-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-generic - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-6.8.0-45-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04 - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04d - 6.8.0-45.45 linux-modules-iwlwifi-oem-22.04 - 6.8.0-45.45 linux-modules-usbio-6.8.0-45-generic - 6.8.0-45.45 linux-modules-usbio-generic - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-45.45 linux-oem-20.04 - 6.8.0-45.45 linux-oem-20.04b - 6.8.0-45.45 linux-oem-20.04c - 6.8.0-45.45 linux-oem-20.04d - 6.8.0-45.45 linux-oem-22.04 - 6.8.0-45.45 linux-source - 6.8.0-45.45 linux-source-6.8.0 - 6.8.0-45.45 linux-tools-6.8.0-45 - 6.8.0-45.45 linux-tools-6.8.0-45-generic - 6.8.0-45.45 linux-tools-6.8.0-45-generic-64k - 6.8.0-45.45 linux-tools-common - 6.8.0-45.45 linux-tools-generic - 6.8.0-45.45 linux-tools-generic-64k - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-lpae - 6.8.0-45.45 linux-tools-host - 6.8.0-45.45 linux-tools-kvm - 6.8.0-45.45 linux-tools-laptop-23.10 - 6.8.0-45.45 linux-tools-oem-20.04 - 6.8.0-45.45 linux-tools-oem-20.04b - 6.8.0-45.45 linux-tools-oem-20.04c - 6.8.0-45.45 linux-tools-oem-20.04d - 6.8.0-45.45 linux-tools-oem-22.04 - 6.8.0-45.45 linux-tools-virtual - 6.8.0-45.45 linux-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-virtual - 6.8.0-45.45 linux-virtual-hwe-24.04 - 6.8.0-45.45 linux-virtual-hwe-24.04-edge - 6.8.0-45.45 No subscription required linux-buildinfo-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-buildinfo-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-cloud-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency - 6.8.0-45.45.1 linux-headers-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency - 6.8.0-45.45.1 linux-image-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency - 6.8.0-45.45.1 linux-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-common - 6.8.0-45.45.1 linux-lowlatency-headers-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-lib-rust-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-lowlatency-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-tools-common - 6.8.0-45.45.1 linux-lowlatency-tools-host - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-modules-iwlwifi-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency - 6.8.0-45.45.1 linux-tools-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1015.17 linux-azure-cloud-tools-6.8.0-1015 - 6.8.0-1015.17 linux-azure-fde - 6.8.0-1015.17 linux-azure-headers-6.8.0-1015 - 6.8.0-1015.17 linux-azure-tools-6.8.0-1015 - 6.8.0-1015.17 linux-buildinfo-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-azure - 6.8.0-1015.17 linux-headers-6.8.0-1015-azure - 6.8.0-1015.17 linux-headers-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure-fde - 6.8.0-1015.17 linux-image-azure - 6.8.0-1015.17 linux-image-azure-fde - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-azure - 6.8.0-1015.17 linux-modules-involflt-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-involflt-azure - 6.8.0-1015.17 linux-modules-iwlwifi-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-iwlwifi-azure - 6.8.0-1015.17 linux-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-tools-azure - 6.8.0-1015.17 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009, CVE-2024-42154, CVE-2024-42228) Update Instructions: Run `sudo pro fix USN-7020-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-raspi - 6.8.0-1012.13 linux-image-6.8.0-1012-raspi - 6.8.0-1012.13 linux-image-raspi - 6.8.0-1012.13 linux-modules-6.8.0-1012-raspi - 6.8.0-1012.13 linux-raspi - 6.8.0-1012.13 linux-raspi-headers-6.8.0-1012 - 6.8.0-1012.13 linux-raspi-tools-6.8.0-1012 - 6.8.0-1012.13 linux-tools-6.8.0-1012-raspi - 6.8.0-1012.13 linux-tools-raspi - 6.8.0-1012.13 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7027-1 -- Emacs vulnerabilities Ubuntu 24.04 LTS It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-45939) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48337) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48338) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48339) It was discovered that Emacs incorrectly handled filename sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-30203, CVE-2024-30204, CVE-2024-30205) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7027-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: emacs - 1:29.3+1-1ubuntu2+esm1 emacs-bin-common - 1:29.3+1-1ubuntu2+esm1 emacs-common - 1:29.3+1-1ubuntu2+esm1 emacs-el - 1:29.3+1-1ubuntu2+esm1 emacs-gtk - 1:29.3+1-1ubuntu2+esm1 emacs-lucid - 1:29.3+1-1ubuntu2+esm1 emacs-nox - 1:29.3+1-1ubuntu2+esm1 emacs-pgtk - 1:29.3+1-1ubuntu2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-45939 CVE-2022-48337 CVE-2022-48338 CVE-2022-48339 CVE-2023-28617 CVE-2024-30203 CVE-2024-30204 CVE-2024-30205 CVE-2024-39331 https://launchpad.net/bugs/2070418 USN-7031-1 -- Puma vulnerability Ubuntu 24.04 LTS It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to overwrite header values set by intermediate proxies by providing duplicate headers containing underscore characters. Update Instructions: Run `sudo pro fix USN-7031-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 6.4.2-4ubuntu4.3 No subscription required Medium CVE-2024-45614 USN-7032-1 -- Tomcat vulnerability Ubuntu 24.04 LTS It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. Update Instructions: Run `sudo pro fix USN-7032-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1 No subscription required Medium CVE-2023-46589 USN-7033-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7033-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240910.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-23984 CVE-2024-24968 USN-7037-1 -- OpenJPEG vulnerability Ubuntu 24.04 LTS It was discovered that OpenJPEG could enter a large loop and continuously print warning messages when given specially crafted input. An attacker could potentially use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7037-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.1 libopenjp2-7-dev - 2.5.0-2ubuntu0.1 libopenjp2-tools - 2.5.0-2ubuntu0.1 libopenjpip-dec-server - 2.5.0-2ubuntu0.1 libopenjpip-server - 2.5.0-2ubuntu0.1 libopenjpip-viewer - 2.5.0-2ubuntu0.1 libopenjpip7 - 2.5.0-2ubuntu0.1 openjpeg-doc - 2.5.0-2ubuntu0.1 No subscription required Medium CVE-2023-39327 USN-7038-1 -- APR vulnerability Ubuntu 24.04 LTS Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data. Update Instructions: Run `sudo pro fix USN-7038-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapr1-dev - 1.7.2-3.1ubuntu0.1 libapr1t64 - 1.7.2-3.1ubuntu0.1 No subscription required Medium CVE-2023-49582 USN-7041-1 -- CUPS vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that CUPS incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7041-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups - 2.4.7-1.2ubuntu7.3 cups-bsd - 2.4.7-1.2ubuntu7.3 cups-client - 2.4.7-1.2ubuntu7.3 cups-common - 2.4.7-1.2ubuntu7.3 cups-core-drivers - 2.4.7-1.2ubuntu7.3 cups-daemon - 2.4.7-1.2ubuntu7.3 cups-ipp-utils - 2.4.7-1.2ubuntu7.3 cups-ppdc - 2.4.7-1.2ubuntu7.3 cups-server-common - 2.4.7-1.2ubuntu7.3 libcups2-dev - 2.4.7-1.2ubuntu7.3 libcups2t64 - 2.4.7-1.2ubuntu7.3 libcupsimage2-dev - 2.4.7-1.2ubuntu7.3 libcupsimage2t64 - 2.4.7-1.2ubuntu7.3 No subscription required Medium CVE-2024-47175 USN-7042-1 -- cups-browsed vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.1 cups-browsed-tests - 2.0.0-0ubuntu10.1 No subscription required Medium CVE-2024-47176 USN-7042-2 -- cups-browsed vulnerability Ubuntu 24.04 LTS USN-7042-1 fixed a vulnerability in cups-browsed. This update improves the fix by removing support for the legacy CUPS printer discovery protocol entirely. Original advisory details: Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.2 cups-browsed-tests - 2.0.0-0ubuntu10.2 No subscription required Medium CVE-2024-47176 USN-7044-1 -- libcupsfilters vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libcupsfilters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7044-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcupsfilters-dev - 2.0.0-0ubuntu7.1 libcupsfilters-tests - 2.0.0-0ubuntu7.1 libcupsfilters2-common - 2.0.0-0ubuntu7.1 libcupsfilters2t64 - 2.0.0-0ubuntu7.1 No subscription required Medium CVE-2024-47076 USN-7045-1 -- libppd vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libppd incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7045-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libppd-dev - 2:2.0.0-0ubuntu4.1 libppd-tests - 2:2.0.0-0ubuntu4.1 libppd-utils - 2:2.0.0-0ubuntu4.1 libppd2 - 2:2.0.0-0ubuntu4.1 libppd2-common - 2:2.0.0-0ubuntu4.1 ppdc - 2:2.0.0-0ubuntu4.1 No subscription required Medium CVE-2024-47175 USN-7046-1 -- Flatpak and Bubblewrap vulnerability Ubuntu 24.04 LTS It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it would not normally have access to. A patch was also needed to Bubblewrap in order to avoid race conditions caused by this fix. Update Instructions: Run `sudo pro fix USN-7046-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bubblewrap - 0.9.0-1ubuntu0.1 No subscription required flatpak - 1.14.6-1ubuntu0.1 flatpak-tests - 1.14.6-1ubuntu0.1 gir1.2-flatpak-1.0 - 1.14.6-1ubuntu0.1 libflatpak-dev - 1.14.6-1ubuntu0.1 libflatpak-doc - 1.14.6-1ubuntu0.1 libflatpak0 - 1.14.6-1ubuntu0.1 No subscription required Medium CVE-2024-42472 https://launchpad.net/bugs/2077087 USN-7048-1 -- Vim vulnerability Ubuntu 24.04 LTS Suyue Guo discovered that Vim incorrectly handled memory when flushing the typeahead buffer, leading to heap-buffer-overflow. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7048-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.3 vim-athena - 2:9.1.0016-1ubuntu7.3 vim-common - 2:9.1.0016-1ubuntu7.3 vim-doc - 2:9.1.0016-1ubuntu7.3 vim-gtk3 - 2:9.1.0016-1ubuntu7.3 vim-gui-common - 2:9.1.0016-1ubuntu7.3 vim-motif - 2:9.1.0016-1ubuntu7.3 vim-nox - 2:9.1.0016-1ubuntu7.3 vim-runtime - 2:9.1.0016-1ubuntu7.3 vim-tiny - 2:9.1.0016-1ubuntu7.3 xxd - 2:9.1.0016-1ubuntu7.3 No subscription required Medium CVE-2024-43802 USN-7049-1 -- PHP vulnerabilities Ubuntu 24.04 LTS It was discovered that PHP incorrectly handled parsing multipart form data. A remote attacker could possibly use this issue to inject payloads and cause PHP to ignore legitimate data. (CVE-2024-8925) It was discovered that PHP incorrectly handled the cgi.force_redirect configuration option due to environment variable collisions. In certain configurations, an attacker could possibly use this issue bypass force_redirect restrictions. (CVE-2024-8927) It was discovered that PHP-FPM incorrectly handled logging. A remote attacker could possibly use this issue to alter and inject arbitrary contents into log files. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-9026) Update Instructions: Run `sudo pro fix USN-7049-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.2 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.2 php8.3 - 8.3.6-0ubuntu0.24.04.2 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.2 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.2 php8.3-cgi - 8.3.6-0ubuntu0.24.04.2 php8.3-cli - 8.3.6-0ubuntu0.24.04.2 php8.3-common - 8.3.6-0ubuntu0.24.04.2 php8.3-curl - 8.3.6-0ubuntu0.24.04.2 php8.3-dba - 8.3.6-0ubuntu0.24.04.2 php8.3-dev - 8.3.6-0ubuntu0.24.04.2 php8.3-enchant - 8.3.6-0ubuntu0.24.04.2 php8.3-fpm - 8.3.6-0ubuntu0.24.04.2 php8.3-gd - 8.3.6-0ubuntu0.24.04.2 php8.3-gmp - 8.3.6-0ubuntu0.24.04.2 php8.3-imap - 8.3.6-0ubuntu0.24.04.2 php8.3-interbase - 8.3.6-0ubuntu0.24.04.2 php8.3-intl - 8.3.6-0ubuntu0.24.04.2 php8.3-ldap - 8.3.6-0ubuntu0.24.04.2 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.2 php8.3-mysql - 8.3.6-0ubuntu0.24.04.2 php8.3-odbc - 8.3.6-0ubuntu0.24.04.2 php8.3-opcache - 8.3.6-0ubuntu0.24.04.2 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.2 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.2 php8.3-pspell - 8.3.6-0ubuntu0.24.04.2 php8.3-readline - 8.3.6-0ubuntu0.24.04.2 php8.3-snmp - 8.3.6-0ubuntu0.24.04.2 php8.3-soap - 8.3.6-0ubuntu0.24.04.2 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.2 php8.3-sybase - 8.3.6-0ubuntu0.24.04.2 php8.3-tidy - 8.3.6-0ubuntu0.24.04.2 php8.3-xml - 8.3.6-0ubuntu0.24.04.2 php8.3-xsl - 8.3.6-0ubuntu0.24.04.2 php8.3-zip - 8.3.6-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-8925 CVE-2024-8927 CVE-2024-9026 USN-7051-1 -- AsyncSSH vulnerability Ubuntu 24.04 LTS Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. Update Instructions: Run `sudo pro fix USN-7051-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-asyncssh-doc - 2.10.1-2ubuntu0.1 python3-asyncssh - 2.10.1-2ubuntu0.1 No subscription required Medium CVE-2023-48795 USN-7054-1 -- unzip vulnerability Ubuntu 24.04 LTS It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into opening a specially crafted zip file, an attacker could possibly use this issue to cause unzip to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7054-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unzip - 6.0-28ubuntu4.1 No subscription required Low CVE-2021-4217 USN-7055-1 -- FreeRADIUS vulnerability Ubuntu 24.04 LTS Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that FreeRADIUS incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces new configuration options called "limit_proxy_state" and "require_message_authenticator" that default to "auto" but should be set to "yes" once all RADIUS devices have been upgraded on a network. Update Instructions: Run `sudo pro fix USN-7055-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freeradius - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-common - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-config - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-dhcp - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-iodbc - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-krb5 - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-ldap - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-memcached - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-mysql - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-postgresql - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-python3 - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-redis - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-rest - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-utils - 3.2.5+dfsg-3~ubuntu24.04.1 freeradius-yubikey - 3.2.5+dfsg-3~ubuntu24.04.1 libfreeradius-dev - 3.2.5+dfsg-3~ubuntu24.04.1 libfreeradius3 - 3.2.5+dfsg-3~ubuntu24.04.1 No subscription required Medium CVE-2024-3596 USN-7057-1 -- WEBrick vulnerability Ubuntu 24.04 LTS It was discovered that WEBrick incorrectly handled having both a Content- Length header and a Transfer-Encoding header. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. Update Instructions: Run `sudo pro fix USN-7057-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-webrick - 1.8.1-1ubuntu0.1 No subscription required Medium CVE-2024-47220 USN-7058-1 -- .NET vulnerabilities Ubuntu 24.04 LTS Brennan Conroy discovered that the .NET Kestrel web server did not properly handle closing HTTP/3 streams under certain circumstances. An attacker could possibly use this issue to achieve remote code execution. This vulnerability only impacted .NET8. (CVE-2024-38229) It was discovered that .NET components designed to process malicious input were susceptible to hash flooding attacks. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43483) It was discovered that the .NET System.IO.Packaging namespace did not properly process SortedList data structures. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43484) It was discovered that .NET did not properly handle the deserialization of of certain JSON properties. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43485) Update Instructions: Run `sudo pro fix USN-7058-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-8.0 - 8.0.10-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.10-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.10-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.10-0ubuntu1~24.04.1 No subscription required dotnet-sdk-8.0 - 8.0.110-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.110-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.110-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.110-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.110-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.110-8.0.10-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-38229 CVE-2024-43483 CVE-2024-43484 CVE-2024-43485 USN-7059-1 -- OATH Toolkit vulnerability Ubuntu 24.04 LTS Fabian Vogt discovered that OATH Toolkit incorrectly handled file permissions. A remote attacker could possibly use this issue to overwrite root owned files, leading to a privilege escalation attack. (CVE-2024-47191) Update Instructions: Run `sudo pro fix USN-7059-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liboath-dev - 2.6.11-2.1ubuntu0.1 liboath0t64 - 2.6.11-2.1ubuntu0.1 libpam-oath - 2.6.11-2.1ubuntu0.1 libpskc-dev - 2.6.11-2.1ubuntu0.1 libpskc0t64 - 2.6.11-2.1ubuntu0.1 oathtool - 2.6.11-2.1ubuntu0.1 pskctool - 2.6.11-2.1ubuntu0.1 No subscription required Medium CVE-2024-47191 USN-7062-1 -- libgsf vulnerabilities Ubuntu 24.04 LTS It was discovered that libgsf incorrectly handled certain Compound Document Binary files. If a user or automated system were tricked into opening a specially crafted file, a remote attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7062-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gsf-1 - 1.14.51-2ubuntu0.1 libgsf-1-114 - 1.14.51-2ubuntu0.1 libgsf-1-common - 1.14.51-2ubuntu0.1 libgsf-1-dev - 1.14.51-2ubuntu0.1 libgsf-bin - 1.14.51-2ubuntu0.1 No subscription required Medium CVE-2024-36474 CVE-2024-42415 USN-7063-1 -- Ubuntu Advantage Desktop Daemon vulnerability Ubuntu 24.04 LTS Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon leaked the Pro token to unprivileged users by passing the token as an argument in plaintext. An attacker could use this issue to gain unauthorized access to an Ubuntu Pro subscription. (CVE-2024-6388) Update Instructions: Run `sudo pro fix USN-7063-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ubuntu-advantage-desktop-daemon - 1.11ubuntu0.1 No subscription required Medium CVE-2024-6388 USN-7064-1 -- nano vulnerability Ubuntu 24.04 LTS It was discovered that nano allowed a possible privilege escalation through an insecure temporary file. If nano was killed while editing, the permissions granted to the emergency save file could be used by an attacker to escalate privileges using a malicious symlink. Update Instructions: Run `sudo pro fix USN-7064-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nano - 7.2-2ubuntu0.1 nano-tiny - 7.2-2ubuntu0.1 No subscription required Low CVE-2024-5742 USN-7070-1 -- libarchive vulnerabilities Ubuntu 24.04 LTS It was discovered that libarchive mishandled certain memory checks, which could result in a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-36227) It was discovered that libarchive mishandled certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-48957, CVE-2024-48958) Update Instructions: Run `sudo pro fix USN-7070-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.2 libarchive-tools - 3.7.2-2ubuntu0.2 libarchive13t64 - 3.7.2-2ubuntu0.2 No subscription required Medium CVE-2022-36227 CVE-2024-48957 CVE-2024-48958 USN-7071-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; (CVE-2024-45016) Update Instructions: Run `sudo pro fix USN-7071-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-raspi - 6.8.0-1013.14 linux-headers-6.8.0-1013-raspi - 6.8.0-1013.14 linux-headers-raspi - 6.8.0-1013.14 linux-image-6.8.0-1013-raspi - 6.8.0-1013.14 linux-image-raspi - 6.8.0-1013.14 linux-modules-6.8.0-1013-raspi - 6.8.0-1013.14 linux-raspi - 6.8.0-1013.14 linux-raspi-headers-6.8.0-1013 - 6.8.0-1013.14 linux-raspi-tools-6.8.0-1013 - 6.8.0-1013.14 linux-tools-6.8.0-1013-raspi - 6.8.0-1013.14 linux-tools-raspi - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1014-ibm - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oem - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oracle - 6.8.0-1014.14 linux-buildinfo-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-headers-6.8.0-1014-ibm - 6.8.0-1014.14 linux-headers-6.8.0-1014-oem - 6.8.0-1014.14 linux-headers-6.8.0-1014-oracle - 6.8.0-1014.14 linux-headers-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-headers-ibm - 6.8.0-1014.14 linux-headers-ibm-classic - 6.8.0-1014.14 linux-headers-ibm-lts-24.04 - 6.8.0-1014.14 linux-headers-oem-24.04 - 6.8.0-1014.14 linux-headers-oem-24.04a - 6.8.0-1014.14 linux-headers-oracle - 6.8.0-1014.14 linux-headers-oracle-64k - 6.8.0-1014.14 linux-ibm - 6.8.0-1014.14 linux-ibm-classic - 6.8.0-1014.14 linux-ibm-cloud-tools-common - 6.8.0-1014.14 linux-ibm-headers-6.8.0-1014 - 6.8.0-1014.14 linux-ibm-lts-24.04 - 6.8.0-1014.14 linux-ibm-source-6.8.0 - 6.8.0-1014.14 linux-ibm-tools-6.8.0-1014 - 6.8.0-1014.14 linux-image-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-6.8.0-1014-oracle - 6.8.0-1014.14 linux-image-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-image-ibm - 6.8.0-1014.14 linux-image-ibm-classic - 6.8.0-1014.14 linux-image-ibm-lts-24.04 - 6.8.0-1014.14 linux-image-oem-24.04 - 6.8.0-1014.14 linux-image-oem-24.04a - 6.8.0-1014.14 linux-image-oracle - 6.8.0-1014.14 linux-image-oracle-64k - 6.8.0-1014.14 linux-image-uc-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-uc-oem-24.04 - 6.8.0-1014.14 linux-image-uc-oem-24.04a - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oem - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oracle - 6.8.0-1014.14 linux-image-unsigned-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-6.8.0-1014-oracle - 6.8.0-1014.14 linux-modules-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-oracle - 6.8.0-1014.14 linux-modules-extra-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-modules-ipu6-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-ipu6-oem-24.04 - 6.8.0-1014.14 linux-modules-ipu6-oem-24.04a - 6.8.0-1014.14 linux-modules-iwlwifi-6.8.0-1014-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-iwlwifi-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-classic - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1014.14 linux-modules-usbio-6.8.0-1014-oem - 6.8.0-1014.14 linux-modules-usbio-oem-24.04 - 6.8.0-1014.14 linux-modules-usbio-oem-24.04a - 6.8.0-1014.14 linux-oem-24.04 - 6.8.0-1014.14 linux-oem-24.04a - 6.8.0-1014.14 linux-oem-6.8-headers-6.8.0-1014 - 6.8.0-1014.14 linux-oem-6.8-tools-6.8.0-1014 - 6.8.0-1014.14 linux-oracle - 6.8.0-1014.14 linux-oracle-64k - 6.8.0-1014.14 linux-oracle-headers-6.8.0-1014 - 6.8.0-1014.14 linux-oracle-tools-6.8.0-1014 - 6.8.0-1014.14 linux-tools-6.8.0-1014-ibm - 6.8.0-1014.14 linux-tools-6.8.0-1014-oem - 6.8.0-1014.14 linux-tools-6.8.0-1014-oracle - 6.8.0-1014.14 linux-tools-6.8.0-1014-oracle-64k - 6.8.0-1014.14 linux-tools-ibm - 6.8.0-1014.14 linux-tools-ibm-classic - 6.8.0-1014.14 linux-tools-ibm-lts-24.04 - 6.8.0-1014.14 linux-tools-oem-24.04 - 6.8.0-1014.14 linux-tools-oem-24.04a - 6.8.0-1014.14 linux-tools-oracle - 6.8.0-1014.14 linux-tools-oracle-64k - 6.8.0-1014.14 No subscription required linux-buildinfo-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-cloud-tools-nvidia - 6.8.0-1015.16 linux-headers-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-headers-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-headers-nvidia - 6.8.0-1015.16 linux-headers-nvidia-64k - 6.8.0-1015.16 linux-image-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-image-nvidia - 6.8.0-1015.16 linux-image-nvidia-64k - 6.8.0-1015.16 linux-image-uc-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-uc-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-modules-nvidia-fs-nvidia - 6.8.0-1015.16 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1015.16 linux-nvidia - 6.8.0-1015.16 linux-nvidia-64k - 6.8.0-1015.16 linux-nvidia-headers-6.8.0-1015 - 6.8.0-1015.16 linux-nvidia-tools-6.8.0-1015 - 6.8.0-1015.16 linux-nvidia-tools-host - 6.8.0-1015.16 linux-tools-6.8.0-1015-nvidia - 6.8.0-1015.16 linux-tools-6.8.0-1015-nvidia-64k - 6.8.0-1015.16 linux-tools-nvidia - 6.8.0-1015.16 linux-tools-nvidia-64k - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-buildinfo-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-headers-nvidia-lowlatency - 6.8.0-1015.16.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-uc-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-uc-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-image-unsigned-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-image-unsigned-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-extra-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1015.16.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-nvidia-lowlatency - 6.8.0-1015.16.1 linux-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-nvidia-lowlatency-headers-6.8.0-1015 - 6.8.0-1015.16.1 linux-nvidia-lowlatency-tools-6.8.0-1015 - 6.8.0-1015.16.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1015.16.1 linux-tools-6.8.0-1015-nvidia-lowlatency - 6.8.0-1015.16.1 linux-tools-6.8.0-1015-nvidia-lowlatency-64k - 6.8.0-1015.16.1 linux-tools-nvidia-lowlatency - 6.8.0-1015.16.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1015.16.1 No subscription required linux-buildinfo-6.8.0-1016-gcp - 6.8.0-1016.18 linux-gcp - 6.8.0-1016.18 linux-gcp-headers-6.8.0-1016 - 6.8.0-1016.18 linux-gcp-tools-6.8.0-1016 - 6.8.0-1016.18 linux-headers-6.8.0-1016-gcp - 6.8.0-1016.18 linux-headers-gcp - 6.8.0-1016.18 linux-image-6.8.0-1016-gcp - 6.8.0-1016.18 linux-image-gcp - 6.8.0-1016.18 linux-image-unsigned-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-extra-6.8.0-1016-gcp - 6.8.0-1016.18 linux-modules-extra-gcp - 6.8.0-1016.18 linux-tools-6.8.0-1016-gcp - 6.8.0-1016.18 linux-tools-gcp - 6.8.0-1016.18 No subscription required linux-aws - 6.8.0-1017.18 linux-aws-cloud-tools-6.8.0-1017 - 6.8.0-1017.18 linux-aws-headers-6.8.0-1017 - 6.8.0-1017.18 linux-aws-tools-6.8.0-1017 - 6.8.0-1017.18 linux-buildinfo-6.8.0-1017-aws - 6.8.0-1017.18 linux-cloud-tools-6.8.0-1017-aws - 6.8.0-1017.18 linux-headers-6.8.0-1017-aws - 6.8.0-1017.18 linux-headers-aws - 6.8.0-1017.18 linux-image-6.8.0-1017-aws - 6.8.0-1017.18 linux-image-aws - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-aws - 6.8.0-1017.18 linux-modules-extra-aws - 6.8.0-1017.18 linux-tools-6.8.0-1017-aws - 6.8.0-1017.18 linux-tools-aws - 6.8.0-1017.18 No subscription required linux-buildinfo-6.8.0-47-generic - 6.8.0-47.47 linux-buildinfo-6.8.0-47-generic-64k - 6.8.0-47.47 linux-cloud-tools-6.8.0-47 - 6.8.0-47.47 linux-cloud-tools-6.8.0-47-generic - 6.8.0-47.47 linux-cloud-tools-common - 6.8.0-47.47 linux-cloud-tools-generic - 6.8.0-47.47 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-47.47 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-47.47 linux-cloud-tools-virtual - 6.8.0-47.47 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-47.47 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-crashdump - 6.8.0-47.47 linux-doc - 6.8.0-47.47 linux-generic - 6.8.0-47.47 linux-generic-64k - 6.8.0-47.47 linux-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-generic-hwe-24.04 - 6.8.0-47.47 linux-generic-hwe-24.04-edge - 6.8.0-47.47 linux-generic-lpae - 6.8.0-47.47 linux-headers-6.8.0-47 - 6.8.0-47.47 linux-headers-6.8.0-47-generic - 6.8.0-47.47 linux-headers-6.8.0-47-generic-64k - 6.8.0-47.47 linux-headers-generic - 6.8.0-47.47 linux-headers-generic-64k - 6.8.0-47.47 linux-headers-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-headers-generic-hwe-24.04 - 6.8.0-47.47 linux-headers-generic-hwe-24.04-edge - 6.8.0-47.47 linux-headers-generic-lpae - 6.8.0-47.47 linux-headers-kvm - 6.8.0-47.47 linux-headers-laptop-23.10 - 6.8.0-47.47 linux-headers-oem-20.04 - 6.8.0-47.47 linux-headers-oem-20.04b - 6.8.0-47.47 linux-headers-oem-20.04c - 6.8.0-47.47 linux-headers-oem-20.04d - 6.8.0-47.47 linux-headers-oem-22.04 - 6.8.0-47.47 linux-headers-virtual - 6.8.0-47.47 linux-headers-virtual-hwe-24.04 - 6.8.0-47.47 linux-headers-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-image-6.8.0-47-generic - 6.8.0-47.47 linux-image-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-extra-virtual - 6.8.0-47.47 linux-image-extra-virtual-hwe-24.04 - 6.8.0-47.47 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic - 6.8.0-47.47 linux-image-generic-64k - 6.8.0-47.47 linux-image-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic-hwe-24.04 - 6.8.0-47.47 linux-image-generic-hwe-24.04-edge - 6.8.0-47.47 linux-image-generic-lpae - 6.8.0-47.47 linux-image-kvm - 6.8.0-47.47 linux-image-laptop-23.10 - 6.8.0-47.47 linux-image-oem-20.04 - 6.8.0-47.47 linux-image-oem-20.04b - 6.8.0-47.47 linux-image-oem-20.04c - 6.8.0-47.47 linux-image-oem-20.04d - 6.8.0-47.47 linux-image-oem-22.04 - 6.8.0-47.47 linux-image-uc-6.8.0-47-generic - 6.8.0-47.47 linux-image-uc-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-uc-generic - 6.8.0-47.47 linux-image-uc-generic-hwe-24.04 - 6.8.0-47.47 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-47.47 linux-image-unsigned-6.8.0-47-generic - 6.8.0-47.47 linux-image-unsigned-6.8.0-47-generic-64k - 6.8.0-47.47 linux-image-virtual - 6.8.0-47.47 linux-image-virtual-hwe-24.04 - 6.8.0-47.47 linux-image-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-kvm - 6.8.0-47.47 linux-laptop-23.10 - 6.8.0-47.47 linux-lib-rust-6.8.0-47-generic - 6.8.0-47.47 linux-libc-dev - 6.8.0-47.47 linux-modules-6.8.0-47-generic - 6.8.0-47.47 linux-modules-6.8.0-47-generic-64k - 6.8.0-47.47 linux-modules-extra-6.8.0-47-generic - 6.8.0-47.47 linux-modules-ipu6-6.8.0-47-generic - 6.8.0-47.47 linux-modules-ipu6-generic - 6.8.0-47.47 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-47.47 linux-modules-iwlwifi-6.8.0-47-generic - 6.8.0-47.47 linux-modules-iwlwifi-generic - 6.8.0-47.47 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-47.47 linux-modules-iwlwifi-oem-20.04 - 6.8.0-47.47 linux-modules-iwlwifi-oem-20.04d - 6.8.0-47.47 linux-modules-iwlwifi-oem-22.04 - 6.8.0-47.47 linux-modules-usbio-6.8.0-47-generic - 6.8.0-47.47 linux-modules-usbio-generic - 6.8.0-47.47 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-47.47 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-47.47 linux-oem-20.04 - 6.8.0-47.47 linux-oem-20.04b - 6.8.0-47.47 linux-oem-20.04c - 6.8.0-47.47 linux-oem-20.04d - 6.8.0-47.47 linux-oem-22.04 - 6.8.0-47.47 linux-source - 6.8.0-47.47 linux-source-6.8.0 - 6.8.0-47.47 linux-tools-6.8.0-47 - 6.8.0-47.47 linux-tools-6.8.0-47-generic - 6.8.0-47.47 linux-tools-6.8.0-47-generic-64k - 6.8.0-47.47 linux-tools-common - 6.8.0-47.47 linux-tools-generic - 6.8.0-47.47 linux-tools-generic-64k - 6.8.0-47.47 linux-tools-generic-64k-hwe-24.04 - 6.8.0-47.47 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-47.47 linux-tools-generic-hwe-24.04 - 6.8.0-47.47 linux-tools-generic-hwe-24.04-edge - 6.8.0-47.47 linux-tools-generic-lpae - 6.8.0-47.47 linux-tools-host - 6.8.0-47.47 linux-tools-kvm - 6.8.0-47.47 linux-tools-laptop-23.10 - 6.8.0-47.47 linux-tools-oem-20.04 - 6.8.0-47.47 linux-tools-oem-20.04b - 6.8.0-47.47 linux-tools-oem-20.04c - 6.8.0-47.47 linux-tools-oem-20.04d - 6.8.0-47.47 linux-tools-oem-22.04 - 6.8.0-47.47 linux-tools-virtual - 6.8.0-47.47 linux-tools-virtual-hwe-24.04 - 6.8.0-47.47 linux-tools-virtual-hwe-24.04-edge - 6.8.0-47.47 linux-virtual - 6.8.0-47.47 linux-virtual-hwe-24.04 - 6.8.0-47.47 linux-virtual-hwe-24.04-edge - 6.8.0-47.47 No subscription required linux-buildinfo-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-buildinfo-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-cloud-tools-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-cloud-tools-lowlatency - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-headers-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-headers-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-headers-lowlatency - 6.8.0-47.47.1 linux-headers-lowlatency-64k - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-image-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-image-lowlatency - 6.8.0-47.47.1 linux-image-lowlatency-64k - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-image-unsigned-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-image-unsigned-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-lowlatency - 6.8.0-47.47.1 linux-lowlatency-64k - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-lowlatency-cloud-tools-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-cloud-tools-common - 6.8.0-47.47.1 linux-lowlatency-headers-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-lowlatency-lib-rust-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-lowlatency-tools-6.8.0-47 - 6.8.0-47.47.1 linux-lowlatency-tools-common - 6.8.0-47.47.1 linux-lowlatency-tools-host - 6.8.0-47.47.1 linux-modules-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-modules-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-modules-iwlwifi-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 linux-tools-6.8.0-47-lowlatency - 6.8.0-47.47.1 linux-tools-6.8.0-47-lowlatency-64k - 6.8.0-47.47.1 linux-tools-lowlatency - 6.8.0-47.47.1 linux-tools-lowlatency-64k - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-47.47.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-47.47.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-47.47.1 No subscription required Medium CVE-2024-45016 USN-7071-2 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; (CVE-2024-45016) Update Instructions: Run `sudo pro fix USN-7071-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-gke - 6.8.0-1012.15 linux-gke - 6.8.0-1012.15 linux-gke-headers-6.8.0-1012 - 6.8.0-1012.15 linux-gke-tools-6.8.0-1012 - 6.8.0-1012.15 linux-headers-6.8.0-1012-gke - 6.8.0-1012.15 linux-headers-gke - 6.8.0-1012.15 linux-image-6.8.0-1012-gke - 6.8.0-1012.15 linux-image-gke - 6.8.0-1012.15 linux-image-unsigned-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-extra-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-iwlwifi-6.8.0-1012-gke - 6.8.0-1012.15 linux-modules-iwlwifi-gke - 6.8.0-1012.15 linux-tools-6.8.0-1012-gke - 6.8.0-1012.15 linux-tools-gke - 6.8.0-1012.15 No subscription required Medium CVE-2024-45016 USN-7074-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Network traffic control; (CVE-2024-45016, CVE-2024-45001) Update Instructions: Run `sudo pro fix USN-7074-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1016.18 linux-azure-cloud-tools-6.8.0-1016 - 6.8.0-1016.18 linux-azure-fde - 6.8.0-1016.18 linux-azure-headers-6.8.0-1016 - 6.8.0-1016.18 linux-azure-tools-6.8.0-1016 - 6.8.0-1016.18 linux-buildinfo-6.8.0-1016-azure - 6.8.0-1016.18 linux-cloud-tools-6.8.0-1016-azure - 6.8.0-1016.18 linux-cloud-tools-azure - 6.8.0-1016.18 linux-headers-6.8.0-1016-azure - 6.8.0-1016.18 linux-headers-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure-fde - 6.8.0-1016.18 linux-image-azure - 6.8.0-1016.18 linux-image-azure-fde - 6.8.0-1016.18 linux-image-unsigned-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-extra-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-extra-azure - 6.8.0-1016.18 linux-modules-involflt-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-involflt-azure - 6.8.0-1016.18 linux-modules-iwlwifi-6.8.0-1016-azure - 6.8.0-1016.18 linux-modules-iwlwifi-azure - 6.8.0-1016.18 linux-tools-6.8.0-1016-azure - 6.8.0-1016.18 linux-tools-azure - 6.8.0-1016.18 No subscription required Medium CVE-2024-45001 CVE-2024-45016 USN-7077-1 -- AMD Microcode vulnerability Ubuntu 24.04 LTS Enrique Nissim and Krzysztof Okupski discovered that some AMD processors did not properly restrict access to the System Management Mode (SMM) configuration when the SMM Lock was enabled. A privileged local attacker could possibly use this issue to further escalate their privileges and execute arbitrary code within the processor's firmware layer. Update Instructions: Run `sudo pro fix USN-7077-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amd64-microcode - 3.20231019.1ubuntu2.1 No subscription required Medium CVE-2023-31315 USN-7079-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7079-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.1-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.1-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.1-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.1-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.1-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.1-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.1-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-40866 CVE-2024-44187 USN-7080-1 -- Unbound vulnerability Ubuntu 24.04 LTS Toshifumi Sakaguchi discovered that Unbound incorrectly handled name compression for large RRsets, which could lead to excessive CPU usage. An attacker could potentially use this issue to cause a denial of service by sending specially crafted DNS responses. Update Instructions: Run `sudo pro fix USN-7080-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.3 libunbound8 - 1.19.2-1ubuntu3.3 python3-unbound - 1.19.2-1ubuntu3.3 unbound - 1.19.2-1ubuntu3.3 unbound-anchor - 1.19.2-1ubuntu3.3 unbound-host - 1.19.2-1ubuntu3.3 No subscription required Medium CVE-2024-8508 USN-7081-1 -- Go vulnerabilities Ubuntu 24.04 LTS It was discovered that the Go net/http module did not properly handle responses to requests with an "Expect: 100-continue" header under certain circumstances. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-24791) It was discovered that the Go parser module did not properly handle deeply nested literal values. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34155) It was discovered that the Go encoding/gob module did not properly handle message decoding under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34156) It was discovered that the Go build module did not properly handle certain build tag lines with deeply nested expressions. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34158) Update Instructions: Run `sudo pro fix USN-7081-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.22 - 1.22.2-2ubuntu0.3 golang-1.22-doc - 1.22.2-2ubuntu0.3 golang-1.22-go - 1.22.2-2ubuntu0.3 golang-1.22-src - 1.22.2-2ubuntu0.3 No subscription required Medium CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 USN-7082-1 -- libheif vulnerability Ubuntu 24.04 LTS Gerrard Tai discovered that libheif did not properly validate certain images, leading to out-of-bounds read and write vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7082-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: heif-gdk-pixbuf - 1.17.6-1ubuntu4.1 heif-thumbnailer - 1.17.6-1ubuntu4.1 libheif-dev - 1.17.6-1ubuntu4.1 libheif-examples - 1.17.6-1ubuntu4.1 libheif-plugin-aomdec - 1.17.6-1ubuntu4.1 libheif-plugin-aomenc - 1.17.6-1ubuntu4.1 libheif-plugin-dav1d - 1.17.6-1ubuntu4.1 libheif-plugin-ffmpegdec - 1.17.6-1ubuntu4.1 libheif-plugin-j2kdec - 1.17.6-1ubuntu4.1 libheif-plugin-j2kenc - 1.17.6-1ubuntu4.1 libheif-plugin-jpegdec - 1.17.6-1ubuntu4.1 libheif-plugin-jpegenc - 1.17.6-1ubuntu4.1 libheif-plugin-libde265 - 1.17.6-1ubuntu4.1 libheif-plugin-rav1e - 1.17.6-1ubuntu4.1 libheif-plugin-svtenc - 1.17.6-1ubuntu4.1 libheif-plugin-x265 - 1.17.6-1ubuntu4.1 libheif1 - 1.17.6-1ubuntu4.1 No subscription required Medium CVE-2024-41311 USN-7083-1 -- OpenJPEG vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenJPEG incorrectly handled certain memory operations when using the command line "-ImgDir" in a directory with a large number of files, leading to an integer overflow vulnerability. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-29338) It was discovered that OpenJPEG incorrectly handled decompressing certain .j2k files in sycc420_to_rgb, leading to a heap-based buffer overflow vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to execute arbitrary code. (CVE-2021-3575) It was discovered that OpenJPEG incorrectly handled certain memory operations in the opj2_decompress program. An attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-1122) Update Instructions: Run `sudo pro fix USN-7083-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.2 libopenjp2-7-dev - 2.5.0-2ubuntu0.2 libopenjp2-tools - 2.5.0-2ubuntu0.2 libopenjpip-dec-server - 2.5.0-2ubuntu0.2 libopenjpip-server - 2.5.0-2ubuntu0.2 libopenjpip-viewer - 2.5.0-2ubuntu0.2 libopenjpip7 - 2.5.0-2ubuntu0.2 openjpeg-doc - 2.5.0-2ubuntu0.2 No subscription required Low CVE-2021-29338 CVE-2021-3575 CVE-2022-1122 USN-7084-1 -- urllib3 vulnerability Ubuntu 24.04 LTS It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7084-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-urllib3 - 2.0.7-1ubuntu0.1 No subscription required Low CVE-2024-37891 USN-7084-2 -- pip vulnerability Ubuntu 24.04 LTS USN-7084-1 fixed vulnerability in urllib3. This update provides the corresponding update for the urllib3 module bundled into pip. Original advisory details: It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7084-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pip - 24.0+dfsg-1ubuntu1.1 python3-pip-whl - 24.0+dfsg-1ubuntu1.1 No subscription required Low CVE-2024-37891 USN-7085-1 -- X.Org X Server vulnerability Ubuntu 24.04 LTS Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain memory operations in the X Keyboard Extension. An attacker could use this issue to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7085-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.12-1ubuntu1.1 xorg-server-source - 2:21.1.12-1ubuntu1.1 xserver-common - 2:21.1.12-1ubuntu1.1 xserver-xephyr - 2:21.1.12-1ubuntu1.1 xserver-xorg-core - 2:21.1.12-1ubuntu1.1 xserver-xorg-dev - 2:21.1.12-1ubuntu1.1 xserver-xorg-legacy - 2:21.1.12-1ubuntu1.1 xvfb - 2:21.1.12-1ubuntu1.1 No subscription required xwayland - 2:23.2.6-1ubuntu0.1 No subscription required Medium CVE-2024-9632 USN-7087-1 -- libarchive vulnerability Ubuntu 24.04 LTS It was discovered that libarchive incorrectly handled certain RAR archive files. If a user or automated system were tricked into processing a specially crafted RAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7087-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.3 libarchive-tools - 3.7.2-2ubuntu0.3 libarchive13t64 - 3.7.2-2ubuntu0.3 No subscription required Medium CVE-2024-20696 USN-7089-1 -- Linux kernel kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42084, CVE-2024-42252, CVE-2024-41096, CVE-2024-42237, CVE-2024-42140, CVE-2024-42150, CVE-2024-41031, CVE-2024-41059, CVE-2024-41062, CVE-2024-41051, CVE-2024-41028, CVE-2024-41090, CVE-2024-41092, CVE-2024-43855, CVE-2024-41021, CVE-2024-42229, CVE-2024-41056, CVE-2024-41048, CVE-2024-41036, CVE-2024-42094, CVE-2024-41089, CVE-2024-41068, CVE-2024-41039, CVE-2024-41095, CVE-2024-41069, CVE-2024-42234, CVE-2024-42136, CVE-2024-41025, CVE-2024-42157, CVE-2024-42248, CVE-2024-42087, CVE-2024-41041, CVE-2024-42230, CVE-2024-42151, CVE-2024-42130, CVE-2024-42244, CVE-2024-41079, CVE-2024-42253, CVE-2024-42092, CVE-2024-41022, CVE-2024-42137, CVE-2024-42132, CVE-2024-42108, CVE-2024-42155, CVE-2024-42127, CVE-2024-41060, CVE-2024-42074, CVE-2024-41081, CVE-2024-42066, CVE-2024-42098, CVE-2024-42082, CVE-2024-42093, CVE-2024-42245, CVE-2024-41072, CVE-2024-41052, CVE-2024-42161, CVE-2024-42096, CVE-2024-42115, CVE-2024-41074, CVE-2024-42120, CVE-2024-41046, CVE-2024-42239, CVE-2024-41063, CVE-2024-42090, CVE-2024-41023, CVE-2024-42069, CVE-2024-41087, CVE-2024-42158, CVE-2024-41067, CVE-2024-41084, CVE-2024-41077, CVE-2024-42240, CVE-2024-42145, CVE-2024-42102, CVE-2024-41020, CVE-2024-42231, CVE-2024-41053, CVE-2024-42131, CVE-2024-42089, CVE-2024-41083, CVE-2024-42247, CVE-2024-42105, CVE-2024-41044, CVE-2024-42128, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-42106, CVE-2024-41076, CVE-2024-42088, CVE-2024-41057, CVE-2024-41091, CVE-2024-42152, CVE-2024-41070, CVE-2024-41035, CVE-2024-41050, CVE-2024-39487, CVE-2024-42113, CVE-2024-42250, CVE-2024-41047, CVE-2024-42149, CVE-2024-42079, CVE-2024-42091, CVE-2024-42227, CVE-2024-42095, CVE-2024-42109, CVE-2024-41033, CVE-2023-52888, CVE-2024-41061, CVE-2024-42223, CVE-2024-42235, CVE-2024-41086, CVE-2024-42133, CVE-2024-41082, CVE-2024-41071, CVE-2024-41007, CVE-2023-52887, CVE-2024-39486, CVE-2024-41075, CVE-2024-42101, CVE-2024-42077, CVE-2024-41042, CVE-2024-42225, CVE-2024-42126, CVE-2024-41094, CVE-2024-41085, CVE-2024-41019, CVE-2024-41058, CVE-2024-41066, CVE-2024-42156, CVE-2024-42119, CVE-2024-41032, CVE-2024-41088, CVE-2024-42100, CVE-2024-42142, CVE-2024-41054, CVE-2024-42103, CVE-2024-42124, CVE-2024-41034, CVE-2024-42251, CVE-2024-42153, CVE-2024-41045, CVE-2024-42086, CVE-2024-42243, CVE-2024-41055, CVE-2024-41078, CVE-2024-42117, CVE-2024-41030, CVE-2024-42068, CVE-2024-42110, CVE-2024-42147, CVE-2024-42121, CVE-2024-41080, CVE-2024-41027, CVE-2024-43858, CVE-2024-42085, CVE-2024-42111, CVE-2024-42238, CVE-2024-41018, CVE-2024-42138, CVE-2024-41038, CVE-2024-42070, CVE-2024-42141, CVE-2024-41098, CVE-2024-42118, CVE-2024-41073, CVE-2024-42144, CVE-2024-42280, CVE-2024-41049, CVE-2024-42076, CVE-2024-41065, CVE-2024-42063, CVE-2024-41064, CVE-2024-41017, CVE-2024-42112, CVE-2024-42064, CVE-2024-42135, CVE-2024-42146, CVE-2024-41010, CVE-2024-41097, CVE-2024-41012, CVE-2024-42097, CVE-2024-42067, CVE-2024-42236, CVE-2024-42080, CVE-2024-42241, CVE-2024-42065, CVE-2024-42232, CVE-2024-42246, CVE-2024-41093, CVE-2024-41015, CVE-2024-42129, CVE-2024-42073, CVE-2024-41029) Update Instructions: Run `sudo pro fix USN-7089-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-48-generic - 6.8.0-48.48 linux-buildinfo-6.8.0-48-generic-64k - 6.8.0-48.48 linux-cloud-tools-6.8.0-48 - 6.8.0-48.48 linux-cloud-tools-6.8.0-48-generic - 6.8.0-48.48 linux-cloud-tools-common - 6.8.0-48.48 linux-cloud-tools-generic - 6.8.0-48.48 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-48.48 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-48.48 linux-cloud-tools-virtual - 6.8.0-48.48 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-48.48 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-crashdump - 6.8.0-48.48 linux-doc - 6.8.0-48.48 linux-generic - 6.8.0-48.48 linux-generic-64k - 6.8.0-48.48 linux-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-generic-hwe-24.04 - 6.8.0-48.48 linux-generic-hwe-24.04-edge - 6.8.0-48.48 linux-generic-lpae - 6.8.0-48.48 linux-headers-6.8.0-48 - 6.8.0-48.48 linux-headers-6.8.0-48-generic - 6.8.0-48.48 linux-headers-6.8.0-48-generic-64k - 6.8.0-48.48 linux-headers-generic - 6.8.0-48.48 linux-headers-generic-64k - 6.8.0-48.48 linux-headers-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-headers-generic-hwe-24.04 - 6.8.0-48.48 linux-headers-generic-hwe-24.04-edge - 6.8.0-48.48 linux-headers-generic-lpae - 6.8.0-48.48 linux-headers-kvm - 6.8.0-48.48 linux-headers-laptop-23.10 - 6.8.0-48.48 linux-headers-oem-20.04 - 6.8.0-48.48 linux-headers-oem-20.04b - 6.8.0-48.48 linux-headers-oem-20.04c - 6.8.0-48.48 linux-headers-oem-20.04d - 6.8.0-48.48 linux-headers-oem-22.04 - 6.8.0-48.48 linux-headers-virtual - 6.8.0-48.48 linux-headers-virtual-hwe-24.04 - 6.8.0-48.48 linux-headers-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-image-6.8.0-48-generic - 6.8.0-48.48 linux-image-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-extra-virtual - 6.8.0-48.48 linux-image-extra-virtual-hwe-24.04 - 6.8.0-48.48 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic - 6.8.0-48.48 linux-image-generic-64k - 6.8.0-48.48 linux-image-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic-hwe-24.04 - 6.8.0-48.48 linux-image-generic-hwe-24.04-edge - 6.8.0-48.48 linux-image-generic-lpae - 6.8.0-48.48 linux-image-kvm - 6.8.0-48.48 linux-image-laptop-23.10 - 6.8.0-48.48 linux-image-oem-20.04 - 6.8.0-48.48 linux-image-oem-20.04b - 6.8.0-48.48 linux-image-oem-20.04c - 6.8.0-48.48 linux-image-oem-20.04d - 6.8.0-48.48 linux-image-oem-22.04 - 6.8.0-48.48 linux-image-uc-6.8.0-48-generic - 6.8.0-48.48 linux-image-uc-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-uc-generic - 6.8.0-48.48 linux-image-uc-generic-hwe-24.04 - 6.8.0-48.48 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-48.48 linux-image-unsigned-6.8.0-48-generic - 6.8.0-48.48 linux-image-unsigned-6.8.0-48-generic-64k - 6.8.0-48.48 linux-image-virtual - 6.8.0-48.48 linux-image-virtual-hwe-24.04 - 6.8.0-48.48 linux-image-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-kvm - 6.8.0-48.48 linux-laptop-23.10 - 6.8.0-48.48 linux-lib-rust-6.8.0-48-generic - 6.8.0-48.48 linux-libc-dev - 6.8.0-48.48 linux-modules-6.8.0-48-generic - 6.8.0-48.48 linux-modules-6.8.0-48-generic-64k - 6.8.0-48.48 linux-modules-extra-6.8.0-48-generic - 6.8.0-48.48 linux-modules-ipu6-6.8.0-48-generic - 6.8.0-48.48 linux-modules-ipu6-generic - 6.8.0-48.48 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-48.48 linux-modules-iwlwifi-6.8.0-48-generic - 6.8.0-48.48 linux-modules-iwlwifi-generic - 6.8.0-48.48 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-48.48 linux-modules-iwlwifi-oem-20.04 - 6.8.0-48.48 linux-modules-iwlwifi-oem-20.04d - 6.8.0-48.48 linux-modules-iwlwifi-oem-22.04 - 6.8.0-48.48 linux-modules-usbio-6.8.0-48-generic - 6.8.0-48.48 linux-modules-usbio-generic - 6.8.0-48.48 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-48.48 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-48.48 linux-oem-20.04 - 6.8.0-48.48 linux-oem-20.04b - 6.8.0-48.48 linux-oem-20.04c - 6.8.0-48.48 linux-oem-20.04d - 6.8.0-48.48 linux-oem-22.04 - 6.8.0-48.48 linux-source - 6.8.0-48.48 linux-source-6.8.0 - 6.8.0-48.48 linux-tools-6.8.0-48 - 6.8.0-48.48 linux-tools-6.8.0-48-generic - 6.8.0-48.48 linux-tools-6.8.0-48-generic-64k - 6.8.0-48.48 linux-tools-common - 6.8.0-48.48 linux-tools-generic - 6.8.0-48.48 linux-tools-generic-64k - 6.8.0-48.48 linux-tools-generic-64k-hwe-24.04 - 6.8.0-48.48 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-48.48 linux-tools-generic-hwe-24.04 - 6.8.0-48.48 linux-tools-generic-hwe-24.04-edge - 6.8.0-48.48 linux-tools-generic-lpae - 6.8.0-48.48 linux-tools-host - 6.8.0-48.48 linux-tools-kvm - 6.8.0-48.48 linux-tools-laptop-23.10 - 6.8.0-48.48 linux-tools-oem-20.04 - 6.8.0-48.48 linux-tools-oem-20.04b - 6.8.0-48.48 linux-tools-oem-20.04c - 6.8.0-48.48 linux-tools-oem-20.04d - 6.8.0-48.48 linux-tools-oem-22.04 - 6.8.0-48.48 linux-tools-virtual - 6.8.0-48.48 linux-tools-virtual-hwe-24.04 - 6.8.0-48.48 linux-tools-virtual-hwe-24.04-edge - 6.8.0-48.48 linux-virtual - 6.8.0-48.48 linux-virtual-hwe-24.04 - 6.8.0-48.48 linux-virtual-hwe-24.04-edge - 6.8.0-48.48 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42101, CVE-2024-41052, CVE-2024-42157, CVE-2024-41020, CVE-2024-41055, CVE-2024-42124, CVE-2023-52888, CVE-2024-42079, CVE-2024-43858, CVE-2024-41075, CVE-2024-42073, CVE-2024-42113, CVE-2024-42110, CVE-2024-41080, CVE-2024-42097, CVE-2024-41046, CVE-2024-42076, CVE-2024-41010, CVE-2024-41018, CVE-2024-42115, CVE-2024-41048, CVE-2024-42231, CVE-2024-42241, CVE-2024-41034, CVE-2024-42065, CVE-2024-42140, CVE-2024-42094, CVE-2024-41029, CVE-2024-42225, CVE-2024-41096, CVE-2024-42088, CVE-2024-41087, CVE-2023-52887, CVE-2024-42141, CVE-2024-42135, CVE-2024-42247, CVE-2024-39487, CVE-2024-42229, CVE-2024-42147, CVE-2024-42252, CVE-2024-41038, CVE-2024-41083, CVE-2024-42091, CVE-2024-42156, CVE-2024-42149, CVE-2024-41015, CVE-2024-41047, CVE-2024-42129, CVE-2024-42120, CVE-2024-41097, CVE-2024-42243, CVE-2024-42084, CVE-2024-42250, CVE-2024-41023, CVE-2024-41028, CVE-2024-42108, CVE-2024-41045, CVE-2024-42098, CVE-2024-41064, CVE-2024-42087, CVE-2024-42080, CVE-2024-41049, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-41044, CVE-2024-42126, CVE-2024-42119, CVE-2024-42223, CVE-2024-42280, CVE-2024-42112, CVE-2024-41019, CVE-2024-42133, CVE-2024-42152, CVE-2024-41074, CVE-2024-41042, CVE-2024-41093, CVE-2024-41025, CVE-2024-42253, CVE-2024-42136, CVE-2024-42127, CVE-2024-41036, CVE-2024-42237, CVE-2024-42111, CVE-2024-41031, CVE-2024-41069, CVE-2024-41084, CVE-2024-41076, CVE-2024-41090, CVE-2024-41088, CVE-2024-41070, CVE-2024-42118, CVE-2024-42238, CVE-2024-42234, CVE-2024-41089, CVE-2024-41095, CVE-2024-41085, CVE-2024-42106, CVE-2024-42155, CVE-2024-42146, CVE-2024-42130, CVE-2024-42089, CVE-2024-42132, CVE-2024-41091, CVE-2024-42153, CVE-2024-42236, CVE-2024-42085, CVE-2024-41065, CVE-2024-41032, CVE-2024-42090, CVE-2024-41030, CVE-2024-41017, CVE-2024-42230, CVE-2024-42144, CVE-2024-42137, CVE-2024-41082, CVE-2024-41056, CVE-2024-42145, CVE-2024-41041, CVE-2024-42240, CVE-2024-41081, CVE-2024-42103, CVE-2024-41053, CVE-2024-42070, CVE-2024-42121, CVE-2024-42105, CVE-2024-41022, CVE-2024-42151, CVE-2024-42142, CVE-2024-41035, CVE-2024-42232, CVE-2024-41058, CVE-2024-42109, CVE-2024-41077, CVE-2024-42095, CVE-2024-39486, CVE-2024-42131, CVE-2024-42068, CVE-2024-41073, CVE-2024-41079, CVE-2024-42082, CVE-2024-41071, CVE-2024-41066, CVE-2024-42102, CVE-2024-43855, CVE-2024-41061, CVE-2024-41072, CVE-2024-41059, CVE-2024-41094, CVE-2024-41021, CVE-2024-41098, CVE-2024-42158, CVE-2024-41033, CVE-2024-42096, CVE-2024-42251, CVE-2024-42077, CVE-2024-42063, CVE-2024-42227, CVE-2024-41007, CVE-2024-41057, CVE-2024-41063, CVE-2024-41039, CVE-2024-41067, CVE-2024-41062, CVE-2024-42100, CVE-2024-42074, CVE-2024-42064, CVE-2024-41092, CVE-2024-42128, CVE-2024-41086, CVE-2024-41054, CVE-2024-42239, CVE-2024-41027, CVE-2024-42093, CVE-2024-42244, CVE-2024-41050, CVE-2024-41012, CVE-2024-42246, CVE-2024-42117, CVE-2024-42069, CVE-2024-42067, CVE-2024-42086, CVE-2024-42066, CVE-2024-41060, CVE-2024-42248, CVE-2024-41068, CVE-2024-42161, CVE-2024-42092, CVE-2024-42245, CVE-2024-41078, CVE-2024-42235, CVE-2024-42150, CVE-2024-41051, CVE-2024-42138) Update Instructions: Run `sudo pro fix USN-7089-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-ibm - 6.8.0-1014.14 linux-headers-ibm-classic - 6.8.0-1014.14 linux-headers-ibm-lts-24.04 - 6.8.0-1014.14 linux-ibm - 6.8.0-1014.14 linux-ibm-classic - 6.8.0-1014.14 linux-ibm-lts-24.04 - 6.8.0-1014.14 linux-image-6.8.0-1014-ibm - 6.8.0-1014.14 linux-image-ibm - 6.8.0-1014.14 linux-image-ibm-classic - 6.8.0-1014.14 linux-image-ibm-lts-24.04 - 6.8.0-1014.14 linux-modules-iwlwifi-ibm - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-classic - 6.8.0-1014.14 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1014.14 linux-tools-ibm - 6.8.0-1014.14 linux-tools-ibm-classic - 6.8.0-1014.14 linux-tools-ibm-lts-24.04 - 6.8.0-1014.14 No subscription required linux-buildinfo-6.8.0-1015-ibm - 6.8.0-1015.15 linux-headers-6.8.0-1015-ibm - 6.8.0-1015.15 linux-ibm-cloud-tools-common - 6.8.0-1015.15 linux-ibm-headers-6.8.0-1015 - 6.8.0-1015.15 linux-ibm-source-6.8.0 - 6.8.0-1015.15 linux-ibm-tools-6.8.0-1015 - 6.8.0-1015.15 linux-image-unsigned-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-extra-6.8.0-1015-ibm - 6.8.0-1015.15 linux-modules-iwlwifi-6.8.0-1015-ibm - 6.8.0-1015.15 linux-tools-6.8.0-1015-ibm - 6.8.0-1015.15 No subscription required linux-azure - 6.8.0-1016.18 linux-azure-fde - 6.8.0-1016.18 linux-cloud-tools-azure - 6.8.0-1016.18 linux-gcp - 6.8.0-1016.18 linux-headers-azure - 6.8.0-1016.18 linux-headers-gcp - 6.8.0-1016.18 linux-image-6.8.0-1016-azure - 6.8.0-1016.18 linux-image-6.8.0-1016-azure-fde - 6.8.0-1016.18 linux-image-6.8.0-1016-gcp - 6.8.0-1016.18 linux-image-azure - 6.8.0-1016.18 linux-image-azure-fde - 6.8.0-1016.18 linux-image-gcp - 6.8.0-1016.18 linux-modules-extra-azure - 6.8.0-1016.18 linux-modules-extra-gcp - 6.8.0-1016.18 linux-modules-involflt-azure - 6.8.0-1016.18 linux-modules-iwlwifi-azure - 6.8.0-1016.18 linux-tools-azure - 6.8.0-1016.18 linux-tools-gcp - 6.8.0-1016.18 No subscription required linux-buildinfo-6.8.0-1017-gcp - 6.8.0-1017.19 linux-gcp-headers-6.8.0-1017 - 6.8.0-1017.19 linux-gcp-tools-6.8.0-1017 - 6.8.0-1017.19 linux-headers-6.8.0-1017-gcp - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-gcp - 6.8.0-1017.19 linux-modules-6.8.0-1017-gcp - 6.8.0-1017.19 linux-modules-extra-6.8.0-1017-gcp - 6.8.0-1017.19 linux-tools-6.8.0-1017-gcp - 6.8.0-1017.19 No subscription required linux-azure-cloud-tools-6.8.0-1017 - 6.8.0-1017.20 linux-azure-headers-6.8.0-1017 - 6.8.0-1017.20 linux-azure-tools-6.8.0-1017 - 6.8.0-1017.20 linux-buildinfo-6.8.0-1017-azure - 6.8.0-1017.20 linux-cloud-tools-6.8.0-1017-azure - 6.8.0-1017.20 linux-headers-6.8.0-1017-azure - 6.8.0-1017.20 linux-image-unsigned-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-extra-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-involflt-6.8.0-1017-azure - 6.8.0-1017.20 linux-modules-iwlwifi-6.8.0-1017-azure - 6.8.0-1017.20 linux-tools-6.8.0-1017-azure - 6.8.0-1017.20 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42239, CVE-2024-42079, CVE-2024-41080, CVE-2024-42064, CVE-2024-42127, CVE-2024-41049, CVE-2024-41086, CVE-2024-42142, CVE-2024-42244, CVE-2024-41060, CVE-2024-42131, CVE-2024-42085, CVE-2024-42246, CVE-2024-41062, CVE-2024-42115, CVE-2024-42234, CVE-2024-42080, CVE-2024-41095, CVE-2024-41063, CVE-2024-42227, CVE-2024-41089, CVE-2024-42133, CVE-2024-43858, CVE-2024-42135, CVE-2024-42113, CVE-2024-42120, CVE-2024-42149, CVE-2024-42132, CVE-2024-41038, CVE-2024-41069, CVE-2024-41090, CVE-2024-41059, CVE-2024-41028, CVE-2024-42126, CVE-2024-42121, CVE-2024-42155, CVE-2024-42110, CVE-2024-41021, CVE-2024-41044, CVE-2024-42098, CVE-2024-42235, CVE-2024-41083, CVE-2024-41065, CVE-2024-42094, CVE-2024-42229, CVE-2024-42240, CVE-2024-42225, CVE-2024-42230, CVE-2024-41088, CVE-2024-42073, CVE-2024-42145, CVE-2024-42076, CVE-2024-42087, CVE-2024-42241, CVE-2024-41019, CVE-2024-41052, CVE-2024-42093, CVE-2024-42063, CVE-2024-41039, CVE-2024-42106, CVE-2024-42108, CVE-2024-42237, CVE-2024-41048, CVE-2024-41033, CVE-2023-52888, CVE-2024-41096, CVE-2024-41032, CVE-2024-41091, CVE-2024-42238, CVE-2024-41056, CVE-2024-42091, CVE-2024-42088, CVE-2024-41047, CVE-2024-42271, CVE-2024-41064, CVE-2024-42223, CVE-2024-42129, CVE-2024-42102, CVE-2024-42146, CVE-2024-42138, CVE-2024-41079, CVE-2024-42232, CVE-2024-42112, CVE-2024-39487, CVE-2024-42245, CVE-2024-41093, CVE-2024-41066, CVE-2024-43855, CVE-2024-41055, CVE-2024-42100, CVE-2024-41053, CVE-2024-42069, CVE-2024-42252, CVE-2024-42243, CVE-2024-42124, CVE-2024-41054, CVE-2024-42151, CVE-2024-42118, CVE-2024-42251, CVE-2024-42137, CVE-2024-41071, CVE-2024-41010, CVE-2024-41087, CVE-2024-41050, CVE-2024-42068, CVE-2024-42158, CVE-2024-41075, CVE-2024-42141, CVE-2024-42236, CVE-2024-41068, CVE-2024-42157, CVE-2024-42140, CVE-2024-41058, CVE-2024-41076, CVE-2024-42097, CVE-2024-41029, CVE-2024-41097, CVE-2024-42109, CVE-2024-41051, CVE-2024-41061, CVE-2024-42156, CVE-2024-42101, CVE-2024-41031, CVE-2024-41017, CVE-2024-42247, CVE-2024-42128, CVE-2024-41085, CVE-2024-41072, CVE-2024-42248, CVE-2024-41045, CVE-2024-42104, CVE-2024-42253, CVE-2024-42117, CVE-2024-41078, CVE-2024-42130, CVE-2024-42090, CVE-2024-42280, CVE-2024-42250, CVE-2024-42231, CVE-2024-41042, CVE-2024-42077, CVE-2024-42153, CVE-2024-41015, CVE-2024-41035, CVE-2024-41082, CVE-2024-42114, CVE-2024-41007, CVE-2024-41073, CVE-2024-42161, CVE-2024-42082, CVE-2024-42150, CVE-2024-42111, CVE-2024-42086, CVE-2024-42095, CVE-2024-41025, CVE-2024-41081, CVE-2024-42105, CVE-2024-41027, CVE-2024-42089, CVE-2024-39486, CVE-2024-41084, CVE-2024-42092, CVE-2024-42152, CVE-2024-41022, CVE-2024-41077, CVE-2024-41098, CVE-2024-41023, CVE-2024-42066, CVE-2024-41034, CVE-2024-41037, CVE-2024-41046, CVE-2023-52887, CVE-2024-42147, CVE-2024-42065, CVE-2024-42096, CVE-2024-41018, CVE-2024-42067, CVE-2024-41041, CVE-2024-42103, CVE-2024-42084, CVE-2024-42074, CVE-2024-41094, CVE-2024-42119, CVE-2024-41012, CVE-2024-41020, CVE-2024-41074, CVE-2024-42144, CVE-2024-41067, CVE-2024-42070, CVE-2024-41057, CVE-2024-41036, CVE-2024-42136, CVE-2024-41030, CVE-2024-41070, CVE-2024-41092) Update Instructions: Run `sudo pro fix USN-7089-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1015-oracle - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-headers-6.8.0-1015-oracle - 6.8.0-1015.16 linux-headers-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-headers-oracle - 6.8.0-1015.16 linux-headers-oracle-64k - 6.8.0-1015.16 linux-image-6.8.0-1015-oracle - 6.8.0-1015.16 linux-image-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-image-oracle - 6.8.0-1015.16 linux-image-oracle-64k - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-oracle - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-modules-6.8.0-1015-oracle - 6.8.0-1015.16 linux-modules-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-oracle - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-oracle - 6.8.0-1015.16 linux-oracle-64k - 6.8.0-1015.16 linux-oracle-headers-6.8.0-1015 - 6.8.0-1015.16 linux-oracle-tools-6.8.0-1015 - 6.8.0-1015.16 linux-tools-6.8.0-1015-oracle - 6.8.0-1015.16 linux-tools-6.8.0-1015-oracle-64k - 6.8.0-1015.16 linux-tools-oracle - 6.8.0-1015.16 linux-tools-oracle-64k - 6.8.0-1015.16 No subscription required linux-aws - 6.8.0-1018.20 linux-aws-cloud-tools-6.8.0-1018 - 6.8.0-1018.20 linux-aws-headers-6.8.0-1018 - 6.8.0-1018.20 linux-aws-tools-6.8.0-1018 - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-aws - 6.8.0-1018.20 linux-cloud-tools-6.8.0-1018-aws - 6.8.0-1018.20 linux-headers-6.8.0-1018-aws - 6.8.0-1018.20 linux-headers-aws - 6.8.0-1018.20 linux-image-6.8.0-1018-aws - 6.8.0-1018.20 linux-image-aws - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-aws - 6.8.0-1018.20 linux-modules-extra-aws - 6.8.0-1018.20 linux-tools-6.8.0-1018-aws - 6.8.0-1018.20 linux-tools-aws - 6.8.0-1018.20 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-4 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-41064, CVE-2024-41087, CVE-2023-52888, CVE-2024-42098, CVE-2024-42111, CVE-2024-42076, CVE-2024-42088, CVE-2024-42135, CVE-2024-42145, CVE-2024-42142, CVE-2024-41036, CVE-2024-41071, CVE-2024-41012, CVE-2024-42091, CVE-2024-42253, CVE-2024-42119, CVE-2024-42097, CVE-2024-42243, CVE-2024-39487, CVE-2024-42235, CVE-2024-42120, CVE-2024-42149, CVE-2024-41015, CVE-2024-41074, CVE-2024-42067, CVE-2024-42090, CVE-2024-42128, CVE-2024-41038, CVE-2024-42113, CVE-2024-42102, CVE-2024-42231, CVE-2024-42080, CVE-2024-42241, CVE-2024-42106, CVE-2024-42130, CVE-2024-42073, CVE-2024-42153, CVE-2024-42156, CVE-2024-42118, CVE-2024-41007, CVE-2024-41049, CVE-2024-39486, CVE-2024-42240, CVE-2024-41018, CVE-2024-42251, CVE-2024-42280, CVE-2024-42096, CVE-2024-42121, CVE-2024-42246, CVE-2024-42092, CVE-2024-41090, CVE-2024-42157, CVE-2024-43858, CVE-2024-42150, CVE-2024-42110, CVE-2024-41010, CVE-2024-41081, CVE-2024-41061, CVE-2024-41078, CVE-2024-41094, CVE-2024-41039, CVE-2024-42114, CVE-2024-42109, CVE-2024-41030, CVE-2024-42066, CVE-2024-41035, CVE-2024-42146, CVE-2024-42131, CVE-2024-41059, CVE-2024-41067, CVE-2024-42138, CVE-2024-41050, CVE-2024-41034, CVE-2024-41077, CVE-2024-41076, CVE-2024-41088, CVE-2024-41096, CVE-2024-41073, CVE-2024-41037, CVE-2024-42232, CVE-2024-41063, CVE-2024-42117, CVE-2024-42155, CVE-2024-41080, CVE-2024-42132, CVE-2024-42084, CVE-2024-42136, CVE-2024-42223, CVE-2024-41068, CVE-2024-42225, CVE-2024-42065, CVE-2024-41051, CVE-2024-43855, CVE-2024-42238, CVE-2024-42250, CVE-2024-42112, CVE-2024-41070, CVE-2023-52887, CVE-2024-42094, CVE-2024-42095, CVE-2024-41086, CVE-2024-41020, CVE-2024-41082, CVE-2024-42115, CVE-2024-42152, CVE-2024-42239, CVE-2024-42093, CVE-2024-42126, CVE-2024-41022, CVE-2024-41017, CVE-2024-41092, CVE-2024-41044, CVE-2024-42140, CVE-2024-41029, CVE-2024-41054, CVE-2024-42158, CVE-2024-41066, CVE-2024-42244, CVE-2024-42070, CVE-2024-41025, CVE-2024-42229, CVE-2024-42085, CVE-2024-41084, CVE-2024-41060, CVE-2024-41062, CVE-2024-42105, CVE-2024-42124, CVE-2024-41045, CVE-2024-42227, CVE-2024-41047, CVE-2024-41042, CVE-2024-42100, CVE-2024-42247, CVE-2024-41041, CVE-2024-42087, CVE-2024-42252, CVE-2024-41058, CVE-2024-42063, CVE-2024-42271, CVE-2024-41027, CVE-2024-42079, CVE-2024-42104, CVE-2024-41098, CVE-2024-41033, CVE-2024-41072, CVE-2024-41031, CVE-2024-42089, CVE-2024-41032, CVE-2024-42127, CVE-2024-41093, CVE-2024-42082, CVE-2024-41023, CVE-2024-41075, CVE-2024-42151, CVE-2024-42141, CVE-2024-42108, CVE-2024-42068, CVE-2024-41085, CVE-2024-42103, CVE-2024-41057, CVE-2024-42064, CVE-2024-42161, CVE-2024-41052, CVE-2024-41053, CVE-2024-42069, CVE-2024-41021, CVE-2024-42147, CVE-2024-41065, CVE-2024-41091, CVE-2024-41079, CVE-2024-42086, CVE-2024-42234, CVE-2024-41055, CVE-2024-41083, CVE-2024-42101, CVE-2024-42230, CVE-2024-41095, CVE-2024-41019, CVE-2024-42245, CVE-2024-42129, CVE-2024-42144, CVE-2024-42236, CVE-2024-41028, CVE-2024-42077, CVE-2024-42248, CVE-2024-41046, CVE-2024-42133, CVE-2024-42074, CVE-2024-41089, CVE-2024-42237, CVE-2024-41056, CVE-2024-41048, CVE-2024-42137, CVE-2024-41069, CVE-2024-41097) Update Instructions: Run `sudo pro fix USN-7089-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1016-oem - 6.8.0-1016.16 linux-headers-6.8.0-1016-oem - 6.8.0-1016.16 linux-headers-oem-24.04 - 6.8.0-1016.16 linux-headers-oem-24.04a - 6.8.0-1016.16 linux-image-6.8.0-1016-oem - 6.8.0-1016.16 linux-image-oem-24.04 - 6.8.0-1016.16 linux-image-oem-24.04a - 6.8.0-1016.16 linux-image-uc-6.8.0-1016-oem - 6.8.0-1016.16 linux-image-uc-oem-24.04 - 6.8.0-1016.16 linux-image-uc-oem-24.04a - 6.8.0-1016.16 linux-image-unsigned-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-ipu6-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-ipu6-oem-24.04 - 6.8.0-1016.16 linux-modules-ipu6-oem-24.04a - 6.8.0-1016.16 linux-modules-iwlwifi-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1016.16 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1016.16 linux-modules-usbio-6.8.0-1016-oem - 6.8.0-1016.16 linux-modules-usbio-oem-24.04 - 6.8.0-1016.16 linux-modules-usbio-oem-24.04a - 6.8.0-1016.16 linux-oem-24.04 - 6.8.0-1016.16 linux-oem-24.04a - 6.8.0-1016.16 linux-oem-6.8-headers-6.8.0-1016 - 6.8.0-1016.16 linux-oem-6.8-tools-6.8.0-1016 - 6.8.0-1016.16 linux-tools-6.8.0-1016-oem - 6.8.0-1016.16 linux-tools-oem-24.04 - 6.8.0-1016.16 linux-tools-oem-24.04a - 6.8.0-1016.16 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-5 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42223, CVE-2024-42244, CVE-2024-42105, CVE-2024-42100, CVE-2024-42235, CVE-2024-41007, CVE-2024-41047, CVE-2024-42088, CVE-2024-42079, CVE-2024-41053, CVE-2024-41094, CVE-2024-42227, CVE-2024-42253, CVE-2024-42150, CVE-2024-41049, CVE-2024-42096, CVE-2024-42093, CVE-2024-41079, CVE-2024-41037, CVE-2024-42129, CVE-2024-41031, CVE-2024-39486, CVE-2024-41065, CVE-2024-42101, CVE-2024-41082, CVE-2024-42135, CVE-2024-42236, CVE-2024-41078, CVE-2024-42098, CVE-2024-41056, CVE-2024-41096, CVE-2024-41074, CVE-2024-42246, CVE-2024-42137, CVE-2024-42232, CVE-2024-42121, CVE-2024-41093, CVE-2024-41076, CVE-2024-42157, CVE-2024-41062, CVE-2024-42104, CVE-2024-42085, CVE-2024-41092, CVE-2024-41034, CVE-2024-41036, CVE-2024-41072, CVE-2024-41012, CVE-2024-39487, CVE-2024-42124, CVE-2024-42065, CVE-2024-41061, CVE-2024-41064, CVE-2024-41091, CVE-2024-42119, CVE-2024-41088, CVE-2024-42089, CVE-2024-41048, CVE-2024-41032, CVE-2024-41020, CVE-2024-42066, CVE-2024-42068, CVE-2024-42238, CVE-2024-41069, CVE-2024-41044, CVE-2024-41025, CVE-2024-42161, CVE-2023-52887, CVE-2024-42127, CVE-2024-42239, CVE-2024-42149, CVE-2024-42091, CVE-2024-42097, CVE-2024-41054, CVE-2024-41041, CVE-2024-42131, CVE-2024-41089, CVE-2024-41018, CVE-2024-42067, CVE-2024-41039, CVE-2024-42128, CVE-2024-42248, CVE-2024-41090, CVE-2024-42073, CVE-2024-43858, CVE-2024-42225, CVE-2024-42077, CVE-2024-42247, CVE-2024-42109, CVE-2024-41045, CVE-2024-41019, CVE-2024-42231, CVE-2024-41017, CVE-2024-42145, CVE-2024-41046, CVE-2024-42063, CVE-2024-41087, CVE-2024-41033, CVE-2024-41021, CVE-2024-42241, CVE-2024-42229, CVE-2024-41015, CVE-2024-42087, CVE-2024-42133, CVE-2024-41073, CVE-2024-42070, CVE-2024-41067, CVE-2024-41077, CVE-2024-42102, CVE-2024-42158, CVE-2024-42126, CVE-2024-41042, CVE-2024-41055, CVE-2024-42092, CVE-2024-42114, CVE-2024-41059, CVE-2024-41058, CVE-2024-41071, CVE-2024-42144, CVE-2024-42146, CVE-2024-41084, CVE-2024-42155, CVE-2024-42245, CVE-2024-42156, CVE-2024-41050, CVE-2024-42141, CVE-2024-42095, CVE-2024-41097, CVE-2024-42103, CVE-2024-42152, CVE-2024-42140, CVE-2024-41023, CVE-2024-41083, CVE-2024-42138, CVE-2024-42271, CVE-2024-42252, CVE-2024-42237, CVE-2024-42132, CVE-2024-41098, CVE-2024-42086, CVE-2024-41063, CVE-2024-42153, CVE-2024-41070, CVE-2024-42115, CVE-2024-42111, CVE-2024-42142, CVE-2024-42069, CVE-2024-41027, CVE-2024-42130, CVE-2024-42090, CVE-2024-42251, CVE-2024-42118, CVE-2024-41060, CVE-2024-41029, CVE-2024-41095, CVE-2024-41038, CVE-2024-42243, CVE-2024-42112, CVE-2024-41035, CVE-2024-42240, CVE-2024-41066, CVE-2024-41085, CVE-2024-42082, CVE-2024-42117, CVE-2024-42250, CVE-2024-41080, CVE-2024-42147, CVE-2024-41081, CVE-2024-42113, CVE-2023-52888, CVE-2024-42136, CVE-2024-41057, CVE-2024-41086, CVE-2024-42064, CVE-2024-42234, CVE-2024-42076, CVE-2024-42084, CVE-2024-42094, CVE-2024-42230, CVE-2024-41068, CVE-2024-43855, CVE-2024-42080, CVE-2024-41052, CVE-2024-41051, CVE-2024-42074, CVE-2024-41010, CVE-2024-41028, CVE-2024-41030, CVE-2024-41022, CVE-2024-42120, CVE-2024-42108, CVE-2024-41075, CVE-2024-42106, CVE-2024-42280, CVE-2024-42110, CVE-2024-42151) Update Instructions: Run `sudo pro fix USN-7089-5` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1014-raspi - 6.8.0-1014.16 linux-headers-6.8.0-1014-raspi - 6.8.0-1014.16 linux-headers-raspi - 6.8.0-1014.16 linux-image-6.8.0-1014-raspi - 6.8.0-1014.16 linux-image-raspi - 6.8.0-1014.16 linux-modules-6.8.0-1014-raspi - 6.8.0-1014.16 linux-raspi - 6.8.0-1014.16 linux-raspi-headers-6.8.0-1014 - 6.8.0-1014.16 linux-raspi-tools-6.8.0-1014 - 6.8.0-1014.16 linux-tools-6.8.0-1014-raspi - 6.8.0-1014.16 linux-tools-raspi - 6.8.0-1014.16 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-6 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-41062, CVE-2024-41029, CVE-2024-42142, CVE-2024-41070, CVE-2024-41066, CVE-2024-42150, CVE-2024-42120, CVE-2023-52888, CVE-2024-42141, CVE-2024-41032, CVE-2024-42245, CVE-2024-41053, CVE-2024-42247, CVE-2024-42161, CVE-2024-42094, CVE-2024-41072, CVE-2024-42076, CVE-2024-42091, CVE-2024-42103, CVE-2024-41007, CVE-2024-42064, CVE-2024-41075, CVE-2024-42157, CVE-2024-42069, CVE-2024-41045, CVE-2024-42068, CVE-2024-42090, CVE-2024-41071, CVE-2024-42082, CVE-2024-42146, CVE-2024-41018, CVE-2024-42238, CVE-2024-41079, CVE-2024-42241, CVE-2024-42067, CVE-2024-42132, CVE-2024-42121, CVE-2024-41025, CVE-2024-42231, CVE-2024-42225, CVE-2024-41080, CVE-2024-41086, CVE-2024-41012, CVE-2024-42234, CVE-2024-41088, CVE-2024-42129, CVE-2024-42158, CVE-2024-41078, CVE-2024-41038, CVE-2024-41055, CVE-2024-42106, CVE-2024-42227, CVE-2024-42102, CVE-2024-41082, CVE-2024-42108, CVE-2024-41085, CVE-2024-41020, CVE-2024-41054, CVE-2024-42085, CVE-2024-42140, CVE-2024-42089, CVE-2024-41047, CVE-2024-42092, CVE-2024-41044, CVE-2024-42246, CVE-2024-41035, CVE-2024-42250, CVE-2024-42070, CVE-2024-41039, CVE-2024-41061, CVE-2024-42147, CVE-2024-42104, CVE-2024-41090, CVE-2024-41096, CVE-2024-41063, CVE-2024-41084, CVE-2024-41059, CVE-2024-41097, CVE-2024-41089, CVE-2024-42093, CVE-2024-42126, CVE-2024-42135, CVE-2024-42128, CVE-2024-42098, CVE-2024-42105, CVE-2024-42124, CVE-2024-42101, CVE-2024-41091, CVE-2024-42127, CVE-2024-41077, CVE-2024-42111, CVE-2024-41037, CVE-2024-42136, CVE-2024-41083, CVE-2024-42243, CVE-2024-41033, CVE-2024-41046, CVE-2024-42230, CVE-2024-42080, CVE-2024-42096, CVE-2024-42100, CVE-2024-42236, CVE-2024-41022, CVE-2024-42086, CVE-2024-42251, CVE-2024-41015, CVE-2024-41027, CVE-2024-42155, CVE-2024-42117, CVE-2024-41036, CVE-2024-42133, CVE-2024-41010, CVE-2024-42151, CVE-2024-42118, CVE-2024-39486, CVE-2024-42066, CVE-2024-42131, CVE-2024-42223, CVE-2024-41081, CVE-2024-42244, CVE-2024-41073, CVE-2024-42114, CVE-2024-42252, CVE-2024-42248, CVE-2024-42110, CVE-2024-41051, CVE-2023-52887, CVE-2024-42156, CVE-2024-41074, CVE-2024-41017, CVE-2024-42079, CVE-2024-41034, CVE-2024-41028, CVE-2024-42109, CVE-2024-42235, CVE-2024-41058, CVE-2024-42232, CVE-2024-42084, CVE-2024-41076, CVE-2024-41030, CVE-2024-41023, CVE-2024-42271, CVE-2024-41050, CVE-2024-41042, CVE-2024-41031, CVE-2024-42112, CVE-2024-41092, CVE-2024-42253, CVE-2024-42152, CVE-2024-41049, CVE-2024-42237, CVE-2024-41095, CVE-2024-42280, CVE-2024-42153, CVE-2024-42115, CVE-2024-42130, CVE-2024-41064, CVE-2024-42077, CVE-2024-41067, CVE-2024-42137, CVE-2024-41019, CVE-2024-42240, CVE-2024-41093, CVE-2024-41048, CVE-2024-42063, CVE-2024-42113, CVE-2024-42145, CVE-2024-42073, CVE-2024-43858, CVE-2024-42088, CVE-2024-41069, CVE-2024-41068, CVE-2024-42138, CVE-2024-41065, CVE-2024-42087, CVE-2024-42239, CVE-2024-42149, CVE-2024-41021, CVE-2024-42065, CVE-2024-39487, CVE-2024-41052, CVE-2024-42095, CVE-2024-42074, CVE-2024-42097, CVE-2024-41098, CVE-2024-41057, CVE-2024-41060, CVE-2024-42119, CVE-2024-42229, CVE-2024-43855, CVE-2024-41056, CVE-2024-41041, CVE-2024-42144, CVE-2024-41087, CVE-2024-41094) Update Instructions: Run `sudo pro fix USN-7089-6` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-gke - 6.8.0-1013.17 linux-gke - 6.8.0-1013.17 linux-gke-headers-6.8.0-1013 - 6.8.0-1013.17 linux-gke-tools-6.8.0-1013 - 6.8.0-1013.17 linux-headers-6.8.0-1013-gke - 6.8.0-1013.17 linux-headers-gke - 6.8.0-1013.17 linux-image-6.8.0-1013-gke - 6.8.0-1013.17 linux-image-gke - 6.8.0-1013.17 linux-image-unsigned-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-extra-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-iwlwifi-6.8.0-1013-gke - 6.8.0-1013.17 linux-modules-iwlwifi-gke - 6.8.0-1013.17 linux-tools-6.8.0-1013-gke - 6.8.0-1013.17 linux-tools-gke - 6.8.0-1013.17 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7089-7 -- Linux kernel (Low Latency) vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42104, CVE-2024-42084, CVE-2024-42252, CVE-2024-41096, CVE-2024-42237, CVE-2024-42140, CVE-2024-42150, CVE-2024-41031, CVE-2024-41059, CVE-2024-41062, CVE-2024-41051, CVE-2024-41028, CVE-2024-41090, CVE-2024-41092, CVE-2024-43855, CVE-2024-41021, CVE-2024-42229, CVE-2024-41056, CVE-2024-41048, CVE-2024-41036, CVE-2024-42094, CVE-2024-41089, CVE-2024-41068, CVE-2024-41039, CVE-2024-41095, CVE-2024-41069, CVE-2024-42234, CVE-2024-42136, CVE-2024-41025, CVE-2024-42157, CVE-2024-42248, CVE-2024-42087, CVE-2024-41041, CVE-2024-42230, CVE-2024-42151, CVE-2024-42130, CVE-2024-42244, CVE-2024-41079, CVE-2024-42253, CVE-2024-42092, CVE-2024-41022, CVE-2024-42137, CVE-2024-42132, CVE-2024-42108, CVE-2024-42155, CVE-2024-42127, CVE-2024-41060, CVE-2024-42074, CVE-2024-41081, CVE-2024-42066, CVE-2024-42098, CVE-2024-42082, CVE-2024-42093, CVE-2024-42245, CVE-2024-41072, CVE-2024-41052, CVE-2024-42161, CVE-2024-42096, CVE-2024-42115, CVE-2024-41074, CVE-2024-42120, CVE-2024-41046, CVE-2024-42239, CVE-2024-41063, CVE-2024-42090, CVE-2024-41023, CVE-2024-42069, CVE-2024-41087, CVE-2024-42158, CVE-2024-41067, CVE-2024-41084, CVE-2024-41077, CVE-2024-42240, CVE-2024-42145, CVE-2024-42102, CVE-2024-41020, CVE-2024-42231, CVE-2024-41053, CVE-2024-42131, CVE-2024-42089, CVE-2024-41083, CVE-2024-42247, CVE-2024-42105, CVE-2024-41044, CVE-2024-42128, CVE-2024-42271, CVE-2024-41037, CVE-2024-42114, CVE-2024-42106, CVE-2024-41076, CVE-2024-42088, CVE-2024-41057, CVE-2024-41091, CVE-2024-42152, CVE-2024-41070, CVE-2024-41035, CVE-2024-41050, CVE-2024-39487, CVE-2024-42113, CVE-2024-42250, CVE-2024-41047, CVE-2024-42149, CVE-2024-42079, CVE-2024-42091, CVE-2024-42227, CVE-2024-42095, CVE-2024-42109, CVE-2024-41033, CVE-2023-52888, CVE-2024-41061, CVE-2024-42223, CVE-2024-42235, CVE-2024-41086, CVE-2024-42133, CVE-2024-41082, CVE-2024-41071, CVE-2024-41007, CVE-2023-52887, CVE-2024-39486, CVE-2024-41075, CVE-2024-42101, CVE-2024-42077, CVE-2024-41042, CVE-2024-42225, CVE-2024-42126, CVE-2024-41094, CVE-2024-41085, CVE-2024-41019, CVE-2024-41058, CVE-2024-41066, CVE-2024-42156, CVE-2024-42119, CVE-2024-41032, CVE-2024-41088, CVE-2024-42100, CVE-2024-42142, CVE-2024-41054, CVE-2024-42103, CVE-2024-42124, CVE-2024-41034, CVE-2024-42251, CVE-2024-42153, CVE-2024-41045, CVE-2024-42086, CVE-2024-42243, CVE-2024-41055, CVE-2024-41078, CVE-2024-42117, CVE-2024-41030, CVE-2024-42068, CVE-2024-42110, CVE-2024-42147, CVE-2024-42121, CVE-2024-41080, CVE-2024-41027, CVE-2024-43858, CVE-2024-42085, CVE-2024-42111, CVE-2024-42238, CVE-2024-41018, CVE-2024-42138, CVE-2024-41038, CVE-2024-42070, CVE-2024-42141, CVE-2024-41098, CVE-2024-42118, CVE-2024-41073, CVE-2024-42144, CVE-2024-42280, CVE-2024-41049, CVE-2024-42076, CVE-2024-41065, CVE-2024-42063, CVE-2024-41064, CVE-2024-41017, CVE-2024-42112, CVE-2024-42064, CVE-2024-42135, CVE-2024-42146, CVE-2024-41010, CVE-2024-41097, CVE-2024-41012, CVE-2024-42097, CVE-2024-42067, CVE-2024-42236, CVE-2024-42080, CVE-2024-42241, CVE-2024-42065, CVE-2024-42232, CVE-2024-42246, CVE-2024-41093, CVE-2024-41015, CVE-2024-42129, CVE-2024-42073, CVE-2024-41029) Update Instructions: Run `sudo pro fix USN-7089-7` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-buildinfo-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-cloud-tools-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-cloud-tools-lowlatency - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-headers-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-headers-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-headers-lowlatency - 6.8.0-48.48.3 linux-headers-lowlatency-64k - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-image-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-image-lowlatency - 6.8.0-48.48.3 linux-image-lowlatency-64k - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-image-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-image-unsigned-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-image-unsigned-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-lowlatency - 6.8.0-48.48.3 linux-lowlatency-64k - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-lowlatency-cloud-tools-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-cloud-tools-common - 6.8.0-48.48.3 linux-lowlatency-headers-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-lowlatency-lib-rust-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-lowlatency-tools-6.8.0-48 - 6.8.0-48.48.3 linux-lowlatency-tools-common - 6.8.0-48.48.3 linux-lowlatency-tools-host - 6.8.0-48.48.3 linux-modules-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-modules-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-modules-iwlwifi-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 linux-tools-6.8.0-48-lowlatency - 6.8.0-48.48.3 linux-tools-6.8.0-48-lowlatency-64k - 6.8.0-48.48.3 linux-tools-lowlatency - 6.8.0-48.48.3 linux-tools-lowlatency-64k - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-48.48.3 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-20.04 - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-24.04 - 6.8.0-48.48.3 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-48.48.3 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 USN-7091-1 -- Ruby vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123) It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-41946) It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-49761) Update Instructions: Run `sudo pro fix USN-7091-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.2 - 3.2.3-1ubuntu0.24.04.3 ruby3.2 - 3.2.3-1ubuntu0.24.04.3 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.3 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.3 No subscription required Medium CVE-2024-35176 CVE-2024-39908 CVE-2024-41123 CVE-2024-41946 CVE-2024-49761 USN-7092-1 -- mpg123 vulnerability Ubuntu 24.04 LTS It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7092-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmpg123-0t64 - 1.32.5-1ubuntu1.1 libmpg123-dev - 1.32.5-1ubuntu1.1 libout123-0t64 - 1.32.5-1ubuntu1.1 libsyn123-0t64 - 1.32.5-1ubuntu1.1 mpg123 - 1.32.5-1ubuntu1.1 No subscription required Medium CVE-2024-10573 USN-7093-1 -- Werkzeug vulnerability Ubuntu 24.04 LTS It was discovered that Werkzeug incorrectly handled multiple form submission requests. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7093-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-werkzeug-doc - 3.0.1-3ubuntu0.2 python3-werkzeug - 3.0.1-3ubuntu0.2 No subscription required Medium CVE-2024-49767 USN-7094-1 -- QEMU vulnerabilities Ubuntu 24.04 LTS It was discovered that QEMU incorrectly handled memory during certain VNC operations. A remote attacker could possibly use this issue to cause QEMU to consume resources, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2019-20382) It was discovered that QEMU incorrectly handled certain memory copy operations when loading ROM contents. If a user were tricked into running an untrusted kernel image, a remote attacker could possibly use this issue to run arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-13765) Aviv Sasson discovered that QEMU incorrectly handled Slirp networking. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-1983) It was discovered that the SLiRP networking implementation of the QEMU emulator did not properly manage memory under certain circumstances. An attacker could use this to cause a heap-based buffer overflow or other out- of-bounds access, which can lead to a denial of service (application crash) or potential execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-7039) It was discovered that the SLiRP networking implementation of the QEMU emulator misuses snprintf return values. An attacker could use this to cause a denial of service (application crash) or potentially execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2020-8608) It was discovered that QEMU SLiRP networking incorrectly handled certain udp packets. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2021-3592, CVE-2021-3594) It was discovered that QEMU had a DMA reentrancy issue, leading to a use-after-free vulnerability. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3019) It was discovered that QEMU had a flaw in Virtio PCI Bindings, leading to a triggerable crash via vhost_net_stop. An attacker inside a guest could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-4693) It was discovered that QEMU incorrectly handled memory in virtio-sound, leading to a heap-based buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-7730) Update Instructions: Run `sudo pro fix USN-7094-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.4 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.4 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.4 qemu-system - 1:8.2.2+ds-0ubuntu1.4 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.4 qemu-system-common - 1:8.2.2+ds-0ubuntu1.4 qemu-system-data - 1:8.2.2+ds-0ubuntu1.4 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.4 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.4 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.4 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.4 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.4 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.4 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.4 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.4 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.4 qemu-user - 1:8.2.2+ds-0ubuntu1.4 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.4 qemu-user-static - 1:8.2.2+ds-0ubuntu1.4 qemu-utils - 1:8.2.2+ds-0ubuntu1.4 No subscription required Medium CVE-2019-20382 CVE-2020-13765 CVE-2020-1983 CVE-2020-7039 CVE-2020-8608 CVE-2021-3592 CVE-2021-3594 CVE-2023-3019 CVE-2024-4693 CVE-2024-7730 https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/2084210 USN-7095-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42271, CVE-2024-42068, CVE-2024-42086, CVE-2024-42132, CVE-2024-42074, CVE-2024-41017, CVE-2024-42090, CVE-2024-42280, CVE-2024-41030, CVE-2024-41037, CVE-2024-42248, CVE-2024-42084, CVE-2024-41057, CVE-2024-42252, CVE-2024-41055, CVE-2024-42158, CVE-2024-42097, CVE-2024-42101, CVE-2024-42095, CVE-2024-41084, CVE-2024-41051, CVE-2024-41032, CVE-2024-41046, CVE-2024-42231, CVE-2024-42133, CVE-2024-42089, CVE-2024-41062, CVE-2024-41033, CVE-2024-41012, CVE-2024-41077, CVE-2024-41064, CVE-2024-41082, CVE-2024-41090, CVE-2024-42065, CVE-2024-41096, CVE-2024-42119, CVE-2024-41054, CVE-2024-42064, CVE-2024-42253, CVE-2024-42237, CVE-2024-42120, CVE-2024-41066, CVE-2024-41083, CVE-2024-42129, CVE-2024-41085, CVE-2024-41058, CVE-2024-42146, CVE-2024-42156, CVE-2024-42076, CVE-2024-42149, CVE-2024-42069, CVE-2024-41039, CVE-2024-42110, CVE-2024-42150, CVE-2024-41015, CVE-2024-39486, CVE-2024-42144, CVE-2024-42131, CVE-2024-42087, CVE-2024-42091, CVE-2024-42236, CVE-2024-42088, CVE-2024-42112, CVE-2024-42142, CVE-2024-42082, CVE-2024-42111, CVE-2024-41028, CVE-2024-45001, CVE-2024-42077, CVE-2024-42102, CVE-2024-42239, CVE-2024-42140, CVE-2024-41091, CVE-2024-41050, CVE-2024-41034, CVE-2024-43858, CVE-2024-42145, CVE-2024-42227, CVE-2024-41029, CVE-2024-42230, CVE-2024-42096, CVE-2024-42238, CVE-2024-41027, CVE-2024-42063, CVE-2024-41023, CVE-2024-41041, CVE-2024-41038, CVE-2024-41073, CVE-2024-41067, CVE-2024-41025, CVE-2024-42152, CVE-2024-42247, CVE-2024-41065, CVE-2024-42121, CVE-2024-42157, CVE-2024-42080, CVE-2024-41076, CVE-2024-41059, CVE-2024-42108, CVE-2024-42251, CVE-2024-42093, CVE-2024-42130, CVE-2024-42126, CVE-2024-42079, CVE-2024-42246, CVE-2024-41081, CVE-2024-42092, CVE-2024-43855, CVE-2024-42235, CVE-2024-42118, CVE-2024-42067, CVE-2024-41047, CVE-2024-42155, CVE-2024-41010, CVE-2024-41061, CVE-2024-41007, CVE-2024-42245, CVE-2024-42106, CVE-2024-42066, CVE-2024-41078, CVE-2024-42113, CVE-2024-41087, CVE-2024-41092, CVE-2024-42234, CVE-2024-42124, CVE-2024-42100, CVE-2024-42128, CVE-2024-41072, CVE-2024-41022, CVE-2024-41049, CVE-2024-42229, CVE-2024-42225, CVE-2024-41052, CVE-2024-42151, CVE-2024-41094, CVE-2024-41098, CVE-2024-41035, CVE-2024-41042, CVE-2024-42114, CVE-2024-42250, CVE-2024-41095, CVE-2024-42138, CVE-2024-42241, CVE-2024-42103, CVE-2024-42094, CVE-2024-41045, CVE-2024-41075, CVE-2024-42073, CVE-2024-42153, CVE-2024-41048, CVE-2024-42085, CVE-2024-41074, CVE-2024-42244, CVE-2024-41018, CVE-2024-41079, CVE-2024-42127, CVE-2023-52887, CVE-2023-52888, CVE-2024-41071, CVE-2024-41020, CVE-2024-41036, CVE-2024-42117, CVE-2024-41068, CVE-2024-41056, CVE-2024-39487, CVE-2024-42243, CVE-2024-41019, CVE-2024-41070, CVE-2024-41044, CVE-2024-41060, CVE-2024-41088, CVE-2024-41021, CVE-2024-41053, CVE-2024-42137, CVE-2024-41086, CVE-2024-42104, CVE-2024-42109, CVE-2024-42105, CVE-2024-42136, CVE-2024-41080, CVE-2024-42098, CVE-2024-41093, CVE-2024-41063, CVE-2024-42161, CVE-2024-42147, CVE-2024-42223, CVE-2024-41097, CVE-2024-41069, CVE-2024-42240, CVE-2024-42135, CVE-2024-42070, CVE-2024-41089, CVE-2024-42141, CVE-2024-42115, CVE-2024-41031, CVE-2024-42232) Update Instructions: Run `sudo pro fix USN-7095-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-buildinfo-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-cloud-tools-nvidia - 6.8.0-1017.19 linux-headers-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-headers-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-headers-nvidia - 6.8.0-1017.19 linux-headers-nvidia-64k - 6.8.0-1017.19 linux-image-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-image-nvidia - 6.8.0-1017.19 linux-image-nvidia-64k - 6.8.0-1017.19 linux-image-uc-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-uc-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-image-unsigned-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-extra-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-modules-nvidia-fs-nvidia - 6.8.0-1017.19 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1017.19 linux-nvidia - 6.8.0-1017.19 linux-nvidia-64k - 6.8.0-1017.19 linux-nvidia-headers-6.8.0-1017 - 6.8.0-1017.19 linux-nvidia-tools-6.8.0-1017 - 6.8.0-1017.19 linux-tools-6.8.0-1017-nvidia - 6.8.0-1017.19 linux-tools-6.8.0-1017-nvidia-64k - 6.8.0-1017.19 linux-tools-nvidia - 6.8.0-1017.19 linux-tools-nvidia-64k - 6.8.0-1017.19 No subscription required linux-buildinfo-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-buildinfo-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-headers-nvidia-lowlatency - 6.8.0-1017.19.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-uc-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-uc-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-image-unsigned-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-image-unsigned-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-extra-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1017.19.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-nvidia-lowlatency - 6.8.0-1017.19.1 linux-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-nvidia-lowlatency-headers-6.8.0-1017 - 6.8.0-1017.19.1 linux-nvidia-lowlatency-tools-6.8.0-1017 - 6.8.0-1017.19.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1017.19.1 linux-tools-6.8.0-1017-nvidia-lowlatency - 6.8.0-1017.19.1 linux-tools-6.8.0-1017-nvidia-lowlatency-64k - 6.8.0-1017.19.1 linux-tools-nvidia-lowlatency - 6.8.0-1017.19.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1017.19.1 No subscription required Medium CVE-2023-52887 CVE-2023-52888 CVE-2024-25741 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42161 CVE-2024-42223 CVE-2024-42225 CVE-2024-42227 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42271 CVE-2024-42280 CVE-2024-43855 CVE-2024-43858 CVE-2024-45001 USN-7096-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS Andy Boothe discovered that the Networking component of OpenJDK 8 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 8 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 8 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21147) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21094) Yi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 8 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 8 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 8 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20926) It was discovered that OpenJDK 8 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 8 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-7096-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-doc - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jdk - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jdk-headless - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre-headless - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-jre-zero - 8u432-ga~us1-0ubuntu2~24.04 openjdk-8-source - 8u432-ga~us1-0ubuntu2~24.04 No subscription required Medium CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952 CVE-2024-21011 CVE-2024-21068 CVE-2024-21085 CVE-2024-21094 CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 USN-7096-2 -- OpenJDK 8 regressions Ubuntu 24.04 LTS USN-7096-1 fixed vulnerabilities in OpenJDK 8. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andy Boothe discovered that the Networking component of OpenJDK 8 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 8 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 8 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 8 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21147) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21094) Yi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 8 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 8 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 8 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20926) It was discovered that OpenJDK 8 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 8 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-7096-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-doc - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jdk - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jdk-headless - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre-headless - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-jre-zero - 8u442-b06~us1-0ubuntu1~24.04 openjdk-8-source - 8u442-b06~us1-0ubuntu1~24.04 No subscription required None https://launchpad.net/bugs/2097400 USN-7097-1 -- OpenJDK 11 vulnerabilities Ubuntu 24.04 LTS Andy Boothe discovered that the Networking component of OpenJDK 11 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 11 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 11 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 11 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-7097-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.25+9-1ubuntu1~24.04 openjdk-11-doc - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jdk - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre-headless - 11.0.25+9-1ubuntu1~24.04 openjdk-11-jre-zero - 11.0.25+9-1ubuntu1~24.04 openjdk-11-source - 11.0.25+9-1ubuntu1~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 USN-7098-1 -- OpenJDK 17 vulnerabilities Ubuntu 24.04 LTS Andy Boothe discovered that the Networking component of OpenJDK 17 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 17 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 17 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 17 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-7098-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.13+11-2ubuntu1~24.04 openjdk-17-doc - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jdk - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jdk-headless - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre-headless - 17.0.13+11-2ubuntu1~24.04 openjdk-17-jre-zero - 17.0.13+11-2ubuntu1~24.04 openjdk-17-source - 17.0.13+11-2ubuntu1~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 USN-7099-1 -- OpenJDK 21 vulnerabilities Ubuntu 24.04 LTS Andy Boothe discovered that the Networking component of OpenJDK 21 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 21 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 21 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) Update Instructions: Run `sudo pro fix USN-7099-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.5+11-1ubuntu1~24.04 openjdk-21-doc - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jdk - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jdk-headless - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre-headless - 21.0.5+11-1ubuntu1~24.04 openjdk-21-jre-zero - 21.0.5+11-1ubuntu1~24.04 openjdk-21-source - 21.0.5+11-1ubuntu1~24.04 openjdk-21-testsupport - 21.0.5+11-1ubuntu1~24.04 No subscription required Medium CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 USN-7102-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.40 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-40.html https://www.oracle.com/security-alerts/cpuoct2024.html Update Instructions: Run `sudo pro fix USN-7102-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.40-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.40-0ubuntu0.24.04.1 mysql-client - 8.0.40-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-router - 8.0.40-0ubuntu0.24.04.1 mysql-server - 8.0.40-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.40-0ubuntu0.24.04.1 mysql-testsuite - 8.0.40-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.40-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-21193 CVE-2024-21194 CVE-2024-21196 CVE-2024-21197 CVE-2024-21198 CVE-2024-21199 CVE-2024-21201 CVE-2024-21212 CVE-2024-21213 CVE-2024-21219 CVE-2024-21230 CVE-2024-21231 CVE-2024-21236 CVE-2024-21237 CVE-2024-21239 CVE-2024-21241 USN-7103-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-46951, CVE-2024-46953, CVE-2024-46955, CVE-2024-46956) It was discovered that Ghostscript incorrectly handled parsing certain PDF files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-46952) It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly bypass file path validation. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-46954) Update Instructions: Run `sudo pro fix USN-7103-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.4 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.4 libgs-common - 10.02.1~dfsg1-0ubuntu7.4 libgs-dev - 10.02.1~dfsg1-0ubuntu7.4 libgs10 - 10.02.1~dfsg1-0ubuntu7.4 libgs10-common - 10.02.1~dfsg1-0ubuntu7.4 No subscription required Medium CVE-2024-46951 CVE-2024-46952 CVE-2024-46953 CVE-2024-46954 CVE-2024-46955 CVE-2024-46956 USN-7104-1 -- curl vulnerability Ubuntu 24.04 LTS It was discovered that curl could overwrite the HSTS expiry of the parent domain with the subdomain's HSTS entry. This could lead to curl switching back to insecure HTTP earlier than otherwise intended, resulting in information exposure. Update Instructions: Run `sudo pro fix USN-7104-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.5 libcurl3t64-gnutls - 8.5.0-2ubuntu10.5 libcurl4-doc - 8.5.0-2ubuntu10.5 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.5 libcurl4-openssl-dev - 8.5.0-2ubuntu10.5 libcurl4t64 - 8.5.0-2ubuntu10.5 No subscription required Low CVE-2024-9681 USN-7108-1 -- AsyncSSH vulnerabilities Ubuntu 24.04 LTS Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH did not properly handle the extension info message. An attacker able to intercept communications could possibly use this issue to downgrade the algorithm used for client authentication. (CVE-2023-46445) Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH did not properly handle the user authentication request message. An attacker could possibly use this issue to control the remote end of an SSH client session via packet injection/removal and shell emulation. (CVE-2023-46446) Update Instructions: Run `sudo pro fix USN-7108-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-asyncssh-doc - 2.10.1-2ubuntu0.1+esm1 python3-asyncssh - 2.10.1-2ubuntu0.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-46445 CVE-2023-46446 USN-7113-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7113-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-44244 CVE-2024-44296 USN-7114-1 -- GLib vulnerability Ubuntu 24.04 LTS It was discovered that Glib incorrectly handled certain trailing characters. An attacker could possibly use this issue to cause a crash or other undefined behavior. Update Instructions: Run `sudo pro fix USN-7114-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.2 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.2 gir1.2-glib-2.0 - 2.80.0-6ubuntu3.2 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.2 libgirepository-2.0-0 - 2.80.0-6ubuntu3.2 libgirepository-2.0-dev - 2.80.0-6ubuntu3.2 libglib2.0-0t64 - 2.80.0-6ubuntu3.2 libglib2.0-bin - 2.80.0-6ubuntu3.2 libglib2.0-data - 2.80.0-6ubuntu3.2 libglib2.0-dev - 2.80.0-6ubuntu3.2 libglib2.0-dev-bin - 2.80.0-6ubuntu3.2 libglib2.0-doc - 2.80.0-6ubuntu3.2 libglib2.0-tests - 2.80.0-6ubuntu3.2 No subscription required Medium CVE-2024-52533 USN-7115-1 -- Waitress vulnerabilities Ubuntu 24.04 LTS It was discovered that Waitress could process follow up requests when receiving a specially crafted message. An attacker could use this issue to have the server process inconsistent client requests. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-49768) Dylan Jay discovered that Waitress could be lead to write to an unexisting socket after closing the remote connection. An attacker could use this issue to increase resource utilization leading to a denial of service. (CVE-2024-49769) Update Instructions: Run `sudo pro fix USN-7115-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-waitress-doc - 2.1.2-2ubuntu0.1~esm1 python3-waitress - 2.1.2-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-49768 CVE-2024-49769 USN-7116-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that Python incorrectly handled quoting path names when using the venv module. A local attacker able to control virtual environments could possibly use this issue to execute arbitrary code when the virtual environment is activated. Update Instructions: Run `sudo pro fix USN-7116-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.3 libpython3.12-dev - 3.12.3-1ubuntu0.3 libpython3.12-minimal - 3.12.3-1ubuntu0.3 libpython3.12-stdlib - 3.12.3-1ubuntu0.3 libpython3.12-testsuite - 3.12.3-1ubuntu0.3 libpython3.12t64 - 3.12.3-1ubuntu0.3 python3.12 - 3.12.3-1ubuntu0.3 python3.12-dev - 3.12.3-1ubuntu0.3 python3.12-doc - 3.12.3-1ubuntu0.3 python3.12-examples - 3.12.3-1ubuntu0.3 python3.12-full - 3.12.3-1ubuntu0.3 python3.12-minimal - 3.12.3-1ubuntu0.3 python3.12-nopie - 3.12.3-1ubuntu0.3 python3.12-venv - 3.12.3-1ubuntu0.3 No subscription required Medium CVE-2024-9287 USN-7117-1 -- needrestart and Module::ScanDeps vulnerabilities Ubuntu 24.04 LTS Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmodule-scandeps-perl - 1.35-1ubuntu0.24.04.1 No subscription required needrestart - 3.6-7ubuntu4.3 No subscription required High CVE-2024-10224 CVE-2024-11003 CVE-2024-48990 CVE-2024-48991 CVE-2024-48992 USN-7117-2 -- needrestart regression Ubuntu 24.04 LTS USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a regression in needrestart. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: needrestart - 3.6-7ubuntu4.4 No subscription required None https://launchpad.net/bugs/2089193 USN-7117-3 -- needrestart regression Ubuntu 24.04 LTS USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a regression in needrestart. This update fixes the problem for LXC containers. We apologize for the inconvenience. Original advisory details: Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run `sudo pro fix USN-7117-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: needrestart - 3.6-7ubuntu4.5 No subscription required None https://launchpad.net/bugs/2091096 USN-7120-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1014-gke - 6.8.0-1014.18 linux-gke - 6.8.0-1014.18 linux-gke-headers-6.8.0-1014 - 6.8.0-1014.18 linux-gke-tools-6.8.0-1014 - 6.8.0-1014.18 linux-headers-6.8.0-1014-gke - 6.8.0-1014.18 linux-headers-gke - 6.8.0-1014.18 linux-image-6.8.0-1014-gke - 6.8.0-1014.18 linux-image-gke - 6.8.0-1014.18 linux-image-unsigned-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-extra-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-iwlwifi-6.8.0-1014-gke - 6.8.0-1014.18 linux-modules-iwlwifi-gke - 6.8.0-1014.18 linux-tools-6.8.0-1014-gke - 6.8.0-1014.18 linux-tools-gke - 6.8.0-1014.18 No subscription required linux-buildinfo-6.8.0-1015-raspi - 6.8.0-1015.17 linux-headers-6.8.0-1015-raspi - 6.8.0-1015.17 linux-headers-raspi - 6.8.0-1015.17 linux-image-6.8.0-1015-raspi - 6.8.0-1015.17 linux-image-raspi - 6.8.0-1015.17 linux-modules-6.8.0-1015-raspi - 6.8.0-1015.17 linux-raspi - 6.8.0-1015.17 linux-raspi-headers-6.8.0-1015 - 6.8.0-1015.17 linux-raspi-tools-6.8.0-1015 - 6.8.0-1015.17 linux-tools-6.8.0-1015-raspi - 6.8.0-1015.17 linux-tools-raspi - 6.8.0-1015.17 No subscription required linux-buildinfo-6.8.0-1016-ibm - 6.8.0-1016.16 linux-headers-6.8.0-1016-ibm - 6.8.0-1016.16 linux-headers-ibm - 6.8.0-1016.16 linux-headers-ibm-classic - 6.8.0-1016.16 linux-headers-ibm-lts-24.04 - 6.8.0-1016.16 linux-ibm - 6.8.0-1016.16 linux-ibm-classic - 6.8.0-1016.16 linux-ibm-cloud-tools-common - 6.8.0-1016.16 linux-ibm-headers-6.8.0-1016 - 6.8.0-1016.16 linux-ibm-lts-24.04 - 6.8.0-1016.16 linux-ibm-source-6.8.0 - 6.8.0-1016.16 linux-ibm-tools-6.8.0-1016 - 6.8.0-1016.16 linux-image-6.8.0-1016-ibm - 6.8.0-1016.16 linux-image-ibm - 6.8.0-1016.16 linux-image-ibm-classic - 6.8.0-1016.16 linux-image-ibm-lts-24.04 - 6.8.0-1016.16 linux-image-unsigned-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-extra-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-6.8.0-1016-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-ibm - 6.8.0-1016.16 linux-modules-iwlwifi-ibm-classic - 6.8.0-1016.16 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1016.16 linux-tools-6.8.0-1016-ibm - 6.8.0-1016.16 linux-tools-ibm - 6.8.0-1016.16 linux-tools-ibm-classic - 6.8.0-1016.16 linux-tools-ibm-lts-24.04 - 6.8.0-1016.16 No subscription required linux-buildinfo-6.8.0-1016-oracle - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-headers-6.8.0-1016-oracle - 6.8.0-1016.17 linux-headers-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-headers-oracle - 6.8.0-1016.17 linux-headers-oracle-64k - 6.8.0-1016.17 linux-image-6.8.0-1016-oracle - 6.8.0-1016.17 linux-image-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-image-oracle - 6.8.0-1016.17 linux-image-oracle-64k - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-oracle - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-modules-6.8.0-1016-oracle - 6.8.0-1016.17 linux-modules-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-oracle - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-oracle - 6.8.0-1016.17 linux-oracle-64k - 6.8.0-1016.17 linux-oracle-headers-6.8.0-1016 - 6.8.0-1016.17 linux-oracle-tools-6.8.0-1016 - 6.8.0-1016.17 linux-tools-6.8.0-1016-oracle - 6.8.0-1016.17 linux-tools-6.8.0-1016-oracle-64k - 6.8.0-1016.17 linux-tools-oracle - 6.8.0-1016.17 linux-tools-oracle-64k - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-1017-oem - 6.8.0-1017.17 linux-headers-6.8.0-1017-oem - 6.8.0-1017.17 linux-headers-oem-24.04 - 6.8.0-1017.17 linux-headers-oem-24.04a - 6.8.0-1017.17 linux-image-6.8.0-1017-oem - 6.8.0-1017.17 linux-image-oem-24.04 - 6.8.0-1017.17 linux-image-oem-24.04a - 6.8.0-1017.17 linux-image-uc-6.8.0-1017-oem - 6.8.0-1017.17 linux-image-uc-oem-24.04 - 6.8.0-1017.17 linux-image-uc-oem-24.04a - 6.8.0-1017.17 linux-image-unsigned-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-ipu6-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-ipu6-oem-24.04 - 6.8.0-1017.17 linux-modules-ipu6-oem-24.04a - 6.8.0-1017.17 linux-modules-iwlwifi-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1017.17 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1017.17 linux-modules-usbio-6.8.0-1017-oem - 6.8.0-1017.17 linux-modules-usbio-oem-24.04 - 6.8.0-1017.17 linux-modules-usbio-oem-24.04a - 6.8.0-1017.17 linux-oem-24.04 - 6.8.0-1017.17 linux-oem-24.04a - 6.8.0-1017.17 linux-oem-6.8-headers-6.8.0-1017 - 6.8.0-1017.17 linux-oem-6.8-tools-6.8.0-1017 - 6.8.0-1017.17 linux-tools-6.8.0-1017-oem - 6.8.0-1017.17 linux-tools-oem-24.04 - 6.8.0-1017.17 linux-tools-oem-24.04a - 6.8.0-1017.17 No subscription required linux-buildinfo-6.8.0-1018-gcp - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-buildinfo-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-cloud-tools-nvidia - 6.8.0-1018.20 linux-gcp - 6.8.0-1018.20 linux-gcp-headers-6.8.0-1018 - 6.8.0-1018.20 linux-gcp-tools-6.8.0-1018 - 6.8.0-1018.20 linux-headers-6.8.0-1018-gcp - 6.8.0-1018.20 linux-headers-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-headers-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-headers-gcp - 6.8.0-1018.20 linux-headers-nvidia - 6.8.0-1018.20 linux-headers-nvidia-64k - 6.8.0-1018.20 linux-image-6.8.0-1018-gcp - 6.8.0-1018.20 linux-image-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-image-gcp - 6.8.0-1018.20 linux-image-nvidia - 6.8.0-1018.20 linux-image-nvidia-64k - 6.8.0-1018.20 linux-image-uc-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-uc-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-gcp - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-image-unsigned-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-6.8.0-1018-gcp - 6.8.0-1018.20 linux-modules-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-gcp - 6.8.0-1018.20 linux-modules-extra-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-extra-gcp - 6.8.0-1018.20 linux-modules-nvidia-fs-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-modules-nvidia-fs-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-modules-nvidia-fs-nvidia - 6.8.0-1018.20 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1018.20 linux-nvidia - 6.8.0-1018.20 linux-nvidia-64k - 6.8.0-1018.20 linux-nvidia-headers-6.8.0-1018 - 6.8.0-1018.20 linux-nvidia-tools-6.8.0-1018 - 6.8.0-1018.20 linux-tools-6.8.0-1018-gcp - 6.8.0-1018.20 linux-tools-6.8.0-1018-nvidia - 6.8.0-1018.20 linux-tools-6.8.0-1018-nvidia-64k - 6.8.0-1018.20 linux-tools-gcp - 6.8.0-1018.20 linux-tools-nvidia - 6.8.0-1018.20 linux-tools-nvidia-64k - 6.8.0-1018.20 No subscription required linux-buildinfo-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-buildinfo-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-headers-nvidia-lowlatency - 6.8.0-1018.20.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-uc-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-uc-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-image-unsigned-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-image-unsigned-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-extra-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1018.20.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-nvidia-lowlatency - 6.8.0-1018.20.1 linux-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-nvidia-lowlatency-headers-6.8.0-1018 - 6.8.0-1018.20.1 linux-nvidia-lowlatency-tools-6.8.0-1018 - 6.8.0-1018.20.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1018.20.1 linux-tools-6.8.0-1018-nvidia-lowlatency - 6.8.0-1018.20.1 linux-tools-6.8.0-1018-nvidia-lowlatency-64k - 6.8.0-1018.20.1 linux-tools-nvidia-lowlatency - 6.8.0-1018.20.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1018.20.1 No subscription required linux-aws - 6.8.0-1019.21 linux-aws-cloud-tools-6.8.0-1019 - 6.8.0-1019.21 linux-aws-headers-6.8.0-1019 - 6.8.0-1019.21 linux-aws-tools-6.8.0-1019 - 6.8.0-1019.21 linux-buildinfo-6.8.0-1019-aws - 6.8.0-1019.21 linux-cloud-tools-6.8.0-1019-aws - 6.8.0-1019.21 linux-headers-6.8.0-1019-aws - 6.8.0-1019.21 linux-headers-aws - 6.8.0-1019.21 linux-image-6.8.0-1019-aws - 6.8.0-1019.21 linux-image-aws - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-aws - 6.8.0-1019.21 linux-modules-extra-aws - 6.8.0-1019.21 linux-tools-6.8.0-1019-aws - 6.8.0-1019.21 linux-tools-aws - 6.8.0-1019.21 No subscription required linux-buildinfo-6.8.0-49-generic - 6.8.0-49.49 linux-buildinfo-6.8.0-49-generic-64k - 6.8.0-49.49 linux-cloud-tools-6.8.0-49 - 6.8.0-49.49 linux-cloud-tools-6.8.0-49-generic - 6.8.0-49.49 linux-cloud-tools-common - 6.8.0-49.49 linux-cloud-tools-generic - 6.8.0-49.49 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-49.49 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-49.49 linux-cloud-tools-virtual - 6.8.0-49.49 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-49.49 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-crashdump - 6.8.0-49.49 linux-doc - 6.8.0-49.49 linux-generic - 6.8.0-49.49 linux-generic-64k - 6.8.0-49.49 linux-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-generic-hwe-24.04 - 6.8.0-49.49 linux-generic-hwe-24.04-edge - 6.8.0-49.49 linux-generic-lpae - 6.8.0-49.49 linux-headers-6.8.0-49 - 6.8.0-49.49 linux-headers-6.8.0-49-generic - 6.8.0-49.49 linux-headers-6.8.0-49-generic-64k - 6.8.0-49.49 linux-headers-generic - 6.8.0-49.49 linux-headers-generic-64k - 6.8.0-49.49 linux-headers-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-headers-generic-hwe-24.04 - 6.8.0-49.49 linux-headers-generic-hwe-24.04-edge - 6.8.0-49.49 linux-headers-generic-lpae - 6.8.0-49.49 linux-headers-kvm - 6.8.0-49.49 linux-headers-laptop-23.10 - 6.8.0-49.49 linux-headers-oem-20.04 - 6.8.0-49.49 linux-headers-oem-20.04b - 6.8.0-49.49 linux-headers-oem-20.04c - 6.8.0-49.49 linux-headers-oem-20.04d - 6.8.0-49.49 linux-headers-oem-22.04 - 6.8.0-49.49 linux-headers-virtual - 6.8.0-49.49 linux-headers-virtual-hwe-24.04 - 6.8.0-49.49 linux-headers-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-image-6.8.0-49-generic - 6.8.0-49.49 linux-image-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-extra-virtual - 6.8.0-49.49 linux-image-extra-virtual-hwe-24.04 - 6.8.0-49.49 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic - 6.8.0-49.49 linux-image-generic-64k - 6.8.0-49.49 linux-image-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic-hwe-24.04 - 6.8.0-49.49 linux-image-generic-hwe-24.04-edge - 6.8.0-49.49 linux-image-generic-lpae - 6.8.0-49.49 linux-image-kvm - 6.8.0-49.49 linux-image-laptop-23.10 - 6.8.0-49.49 linux-image-oem-20.04 - 6.8.0-49.49 linux-image-oem-20.04b - 6.8.0-49.49 linux-image-oem-20.04c - 6.8.0-49.49 linux-image-oem-20.04d - 6.8.0-49.49 linux-image-oem-22.04 - 6.8.0-49.49 linux-image-uc-6.8.0-49-generic - 6.8.0-49.49 linux-image-uc-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-uc-generic - 6.8.0-49.49 linux-image-uc-generic-hwe-24.04 - 6.8.0-49.49 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-49.49 linux-image-unsigned-6.8.0-49-generic - 6.8.0-49.49 linux-image-unsigned-6.8.0-49-generic-64k - 6.8.0-49.49 linux-image-virtual - 6.8.0-49.49 linux-image-virtual-hwe-24.04 - 6.8.0-49.49 linux-image-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-kvm - 6.8.0-49.49 linux-laptop-23.10 - 6.8.0-49.49 linux-lib-rust-6.8.0-49-generic - 6.8.0-49.49 linux-libc-dev - 6.8.0-49.49 linux-modules-6.8.0-49-generic - 6.8.0-49.49 linux-modules-6.8.0-49-generic-64k - 6.8.0-49.49 linux-modules-extra-6.8.0-49-generic - 6.8.0-49.49 linux-modules-ipu6-6.8.0-49-generic - 6.8.0-49.49 linux-modules-ipu6-generic - 6.8.0-49.49 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-49.49 linux-modules-iwlwifi-6.8.0-49-generic - 6.8.0-49.49 linux-modules-iwlwifi-generic - 6.8.0-49.49 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-49.49 linux-modules-iwlwifi-oem-20.04 - 6.8.0-49.49 linux-modules-iwlwifi-oem-20.04d - 6.8.0-49.49 linux-modules-iwlwifi-oem-22.04 - 6.8.0-49.49 linux-modules-usbio-6.8.0-49-generic - 6.8.0-49.49 linux-modules-usbio-generic - 6.8.0-49.49 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-49.49 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-49.49 linux-oem-20.04 - 6.8.0-49.49 linux-oem-20.04b - 6.8.0-49.49 linux-oem-20.04c - 6.8.0-49.49 linux-oem-20.04d - 6.8.0-49.49 linux-oem-22.04 - 6.8.0-49.49 linux-source - 6.8.0-49.49 linux-source-6.8.0 - 6.8.0-49.49 linux-tools-6.8.0-49 - 6.8.0-49.49 linux-tools-6.8.0-49-generic - 6.8.0-49.49 linux-tools-6.8.0-49-generic-64k - 6.8.0-49.49 linux-tools-common - 6.8.0-49.49 linux-tools-generic - 6.8.0-49.49 linux-tools-generic-64k - 6.8.0-49.49 linux-tools-generic-64k-hwe-24.04 - 6.8.0-49.49 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-49.49 linux-tools-generic-hwe-24.04 - 6.8.0-49.49 linux-tools-generic-hwe-24.04-edge - 6.8.0-49.49 linux-tools-generic-lpae - 6.8.0-49.49 linux-tools-host - 6.8.0-49.49 linux-tools-kvm - 6.8.0-49.49 linux-tools-laptop-23.10 - 6.8.0-49.49 linux-tools-oem-20.04 - 6.8.0-49.49 linux-tools-oem-20.04b - 6.8.0-49.49 linux-tools-oem-20.04c - 6.8.0-49.49 linux-tools-oem-20.04d - 6.8.0-49.49 linux-tools-oem-22.04 - 6.8.0-49.49 linux-tools-virtual - 6.8.0-49.49 linux-tools-virtual-hwe-24.04 - 6.8.0-49.49 linux-tools-virtual-hwe-24.04-edge - 6.8.0-49.49 linux-virtual - 6.8.0-49.49 linux-virtual-hwe-24.04 - 6.8.0-49.49 linux-virtual-hwe-24.04-edge - 6.8.0-49.49 No subscription required High CVE-2024-43882 CVE-2024-46800 USN-7120-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1018.21 linux-azure-cloud-tools-6.8.0-1018 - 6.8.0-1018.21 linux-azure-fde - 6.8.0-1018.21 linux-azure-headers-6.8.0-1018 - 6.8.0-1018.21 linux-azure-tools-6.8.0-1018 - 6.8.0-1018.21 linux-buildinfo-6.8.0-1018-azure - 6.8.0-1018.21 linux-cloud-tools-6.8.0-1018-azure - 6.8.0-1018.21 linux-cloud-tools-azure - 6.8.0-1018.21 linux-headers-6.8.0-1018-azure - 6.8.0-1018.21 linux-headers-azure - 6.8.0-1018.21 linux-image-6.8.0-1018-azure - 6.8.0-1018.21 linux-image-6.8.0-1018-azure-fde - 6.8.0-1018.21 linux-image-azure - 6.8.0-1018.21 linux-image-azure-fde - 6.8.0-1018.21 linux-image-unsigned-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-extra-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-extra-azure - 6.8.0-1018.21 linux-modules-involflt-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-involflt-azure - 6.8.0-1018.21 linux-modules-iwlwifi-6.8.0-1018-azure - 6.8.0-1018.21 linux-modules-iwlwifi-azure - 6.8.0-1018.21 linux-tools-6.8.0-1018-azure - 6.8.0-1018.21 linux-tools-azure - 6.8.0-1018.21 No subscription required High CVE-2024-43882 CVE-2024-46800 USN-7120-3 -- Linux kernel (Low Latency) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run `sudo pro fix USN-7120-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-buildinfo-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-cloud-tools-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-cloud-tools-lowlatency - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-headers-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-headers-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-headers-lowlatency - 6.8.0-49.49.1 linux-headers-lowlatency-64k - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-image-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-image-lowlatency - 6.8.0-49.49.1 linux-image-lowlatency-64k - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-image-unsigned-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-image-unsigned-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-lowlatency - 6.8.0-49.49.1 linux-lowlatency-64k - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-lowlatency-cloud-tools-6.8.0-49 - 6.8.0-49.49.1 linux-lowlatency-headers-6.8.0-49 - 6.8.0-49.49.1 linux-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-lowlatency-lib-rust-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-lowlatency-tools-6.8.0-49 - 6.8.0-49.49.1 linux-modules-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-modules-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-modules-iwlwifi-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 linux-tools-6.8.0-49-lowlatency - 6.8.0-49.49.1 linux-tools-6.8.0-49-lowlatency-64k - 6.8.0-49.49.1 linux-tools-lowlatency - 6.8.0-49.49.1 linux-tools-lowlatency-64k - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-49.49.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-49.49.1 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-49.49.1 No subscription required High CVE-2024-43882 CVE-2024-46800 USN-7125-1 -- RapidJSON vulnerability Ubuntu 24.04 LTS It was discovered that RapidJSON incorrectly parsed numbers written in scientific notation, leading to an integer underflow. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7125-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rapidjson-dev - 1.1.0+dfsg2-7.2ubuntu0.1~esm1 rapidjson-doc - 1.1.0+dfsg2-7.2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-38517 USN-7126-1 -- libsoup vulnerabilities Ubuntu 24.04 LTS It was discovered that libsoup ignored certain characters at the end of header names. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. (CVE-2024-52530) It was discovered that libsoup did not correctly handle memory while performing UTF-8 conversions. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-52531) It was discovered that libsoup could enter an infinite loop when reading certain websocket data. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-52532) Update Instructions: Run `sudo pro fix USN-7126-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.1 libsoup-2.4-1 - 2.74.3-6ubuntu1.1 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.1 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.1 libsoup2.4-common - 2.74.3-6ubuntu1.1 libsoup2.4-dev - 2.74.3-6ubuntu1.1 libsoup2.4-doc - 2.74.3-6ubuntu1.1 libsoup2.4-tests - 2.74.3-6ubuntu1.1 No subscription required Medium CVE-2024-52530 CVE-2024-52531 CVE-2024-52532 USN-7127-1 -- libsoup3 vulnerabilities Ubuntu 24.04 LTS It was discovered that libsoup ignored certain characters at the end of header names. A remote attacker could possibly use this issue to perform a HTTP request smuggling attack. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-52530) It was discovered that libsoup did not correctly handle memory while performing UTF-8 conversions. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-52531) It was discovered that libsoup could enter an infinite loop when reading certain websocket data. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-52532) Update Instructions: Run `sudo pro fix USN-7127-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-3.0 - 3.4.4-5ubuntu0.1 libsoup-3.0-0 - 3.4.4-5ubuntu0.1 libsoup-3.0-common - 3.4.4-5ubuntu0.1 libsoup-3.0-dev - 3.4.4-5ubuntu0.1 libsoup-3.0-doc - 3.4.4-5ubuntu0.1 libsoup-3.0-tests - 3.4.4-5ubuntu0.1 No subscription required Medium CVE-2024-52530 CVE-2024-52531 CVE-2024-52532 USN-7130-1 -- GitHub CLI vulnerability Ubuntu 24.04 LTS It was discovered that GitHub CLI incorrectly handled username validation. An attacker could possibly use this issue to perform remote code execution if the user connected to a malicious server. (CVE-2024-52308) Update Instructions: Run `sudo pro fix USN-7130-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gh - 2.45.0-1ubuntu0.2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-52308 USN-7131-1 -- Vim vulnerability Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when closing a buffer, leading to use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7131-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.5 vim-athena - 2:9.1.0016-1ubuntu7.5 vim-common - 2:9.1.0016-1ubuntu7.5 vim-doc - 2:9.1.0016-1ubuntu7.5 vim-gtk3 - 2:9.1.0016-1ubuntu7.5 vim-gui-common - 2:9.1.0016-1ubuntu7.5 vim-motif - 2:9.1.0016-1ubuntu7.5 vim-nox - 2:9.1.0016-1ubuntu7.5 vim-runtime - 2:9.1.0016-1ubuntu7.5 vim-tiny - 2:9.1.0016-1ubuntu7.5 xxd - 2:9.1.0016-1ubuntu7.5 No subscription required Low CVE-2024-47814 USN-7132-1 -- PostgreSQL vulnerabilities Ubuntu 24.04 LTS It was discovered that PostgreSQL incorrectly tracked tables with row security. A remote attacker could possibly use this issue to perform forbidden reads and modifications. (CVE-2024-10976) Jacob Champion discovered that PostgreSQL clients used untrusted server error messages. An attacker that is able to intercept network communications could possibly use this issue to inject error messages that could be interpreted as valid query results. (CVE-2024-10977) Tom Lane discovered that PostgreSQL incorrectly handled certain privilege assignments. A remote attacker could possibly use this issue to view or change different rows from those intended. (CVE-2024-10978) Coby Abrams discovered that PostgreSQL incorrectly handled environment variables. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-10979) Update Instructions: Run `sudo pro fix USN-7132-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.6-0ubuntu0.24.04.1 libecpg-dev - 16.6-0ubuntu0.24.04.1 libecpg6 - 16.6-0ubuntu0.24.04.1 libpgtypes3 - 16.6-0ubuntu0.24.04.1 libpq-dev - 16.6-0ubuntu0.24.04.1 libpq5 - 16.6-0ubuntu0.24.04.1 postgresql-16 - 16.6-0ubuntu0.24.04.1 postgresql-client-16 - 16.6-0ubuntu0.24.04.1 postgresql-doc-16 - 16.6-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.6-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.6-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.6-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.6-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-10976 CVE-2024-10977 CVE-2024-10978 CVE-2024-10979 USN-7133-1 -- HAProxy vulnerability Ubuntu 24.04 LTS Yuki Mogi discovered that HAProxy incorrectly handled the interpretation of certain HTTP requests. A remote attacker could possibly use this issue to perform a request smuggling attack and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7133-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: haproxy - 2.8.5-1ubuntu3.2 haproxy-doc - 2.8.5-1ubuntu3.2 vim-haproxy - 2.8.5-1ubuntu3.2 No subscription required Medium CVE-2024-53008 USN-7136-1 -- Django vulnerabilities Ubuntu 24.04 LTS jiangniao discovered that Django incorrectly handled the API to strip tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. (CVE-2024-53907) Seokchan Yoon discovered that Django incorrectly handled HasKey lookups when using Oracle. A remote attacker could possibly use this issue to inject arbitrary SQL code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-53908) Update Instructions: Run `sudo pro fix USN-7136-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.4 python3-django - 3:4.2.11-1ubuntu1.4 No subscription required Medium CVE-2024-53907 CVE-2024-53908 USN-7141-1 -- oFono vulnerabilities Ubuntu 24.04 LTS It was discovered that oFono incorrectly handled decoding SMS messages leading to a stack overflow. A remote attacker could potentially use this issue to cause a denial of service. (CVE-2023-2794, CVE-2023-4233, CVE-2023-4234) Update Instructions: Run `sudo pro fix USN-7141-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ofono - 1.31-3ubuntu3.24.04.1 ofono-dev - 1.31-3ubuntu3.24.04.1 ofono-scripts - 1.31-3ubuntu3.24.04.1 No subscription required Medium CVE-2023-2794 CVE-2023-4233 CVE-2023-4234 USN-7142-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7142-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.4-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.4-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.4-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.4-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.4-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.4-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.4-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.4-0ubuntu0.24.04.1 No subscription required High CVE-2024-44308 CVE-2024-44309 USN-7145-1 -- Expat vulnerability Ubuntu 24.04 LTS It was discovered that Expat did not properly handle its internal state when attempting to resume an unstarted parser. An attacker could use this issue to cause a denial of service (application crash). Update Instructions: Run `sudo pro fix USN-7145-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.2 libexpat1 - 2.6.1-2ubuntu0.2 libexpat1-dev - 2.6.1-2ubuntu0.2 No subscription required Medium CVE-2024-50602 USN-7147-1 -- Apache Shiro vulnerabilities Ubuntu 24.04 LTS It was discovered that Apache Shiro incorrectly handled path traversal when used with other web frameworks or path rewriting. An attacker could possibly use this issue to obtain sensitive information or administrative privileges. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-34478, CVE-2023-46749) It was discovered that Apache Shiro incorrectly handled web redirects when used together with the form authentication method. An attacker could possibly use this issue to perform phishing attacks. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-46750) It was discovered that Apache Shiro incorrectly handled requests through servlet filtering. An attacker could possibly use this issue to obtain administrative privileges. This update provides the corresponding fix for Ubuntu 16.04 LTS. (CVE-2016-6802) Update Instructions: Run `sudo pro fix USN-7147-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libshiro-java - 1.3.2-5ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2016-6802 CVE-2023-34478 CVE-2023-46749 CVE-2023-46750 USN-7149-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS Avraham Shalev and Nagaraju N Kodalapura discovered that some Intel(R) Xeon(R) processors did not properly restrict access to the memory controller when using Intel(R) SGX. This may allow a local privileged attacker to further escalate their privileges. (CVE-2024-21820, CVE-2024-23918) It was discovered that some 4th and 5th Generation Intel(R) Xeon(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. THis may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-21853) It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7149-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20241112.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-21820 CVE-2024-21853 CVE-2024-23918 CVE-2024-23984 CVE-2024-24968 USN-7150-1 -- Tornado vulnerabilities Ubuntu 24.04 LTS It was discovered that Tornado incorrectly handled a certain redirect. A remote attacker could possibly use this issue to redirect a user to an arbitrary web site and conduct a phishing attack by having the user access a specially crafted URL. This issue was only addressed in Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. Ubuntu 16.04 LTS was previously addressed in USN-6159-1. (CVE-2023-28370) It was discovered that Tornado inefficiently handled requests when parsing cookies. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. (CVE-2024-52804) Update Instructions: Run `sudo pro fix USN-7150-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-tornado-doc - 6.4.0-1ubuntu0.1 python3-tornado - 6.4.0-1ubuntu0.1 No subscription required Medium CVE-2023-28370 CVE-2024-52804 USN-7151-1 -- oFono vulnerabilities Ubuntu 24.04 LTS It was discovered that oFono incorrectly handled decoding SMS messages leading to a stack overflow. A remote attacker could potentially use this issue to cause a denial of service. (CVE-2023-4232, CVE-2023-4235) Update Instructions: Run `sudo pro fix USN-7151-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ofono - 1.31-3ubuntu3.24.04.2 ofono-dev - 1.31-3ubuntu3.24.04.2 ofono-scripts - 1.31-3ubuntu3.24.04.2 No subscription required Medium CVE-2023-4232 CVE-2023-4235 USN-7154-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-46783, CVE-2024-44960, CVE-2024-46743, CVE-2024-45009, CVE-2024-43820, CVE-2024-43888, CVE-2024-45010, CVE-2024-43839, CVE-2024-42304, CVE-2024-43846, CVE-2024-42258, CVE-2024-45005, CVE-2024-46709, CVE-2024-46774, CVE-2024-43883, CVE-2024-43859, CVE-2024-46721, CVE-2024-44944, CVE-2024-43913, CVE-2024-43843, CVE-2024-43845, CVE-2024-45018, CVE-2024-43909, CVE-2024-46755, CVE-2024-42284, CVE-2024-42301, CVE-2024-46779, CVE-2024-44971, CVE-2024-46711, CVE-2024-43889, CVE-2024-46842, CVE-2024-44978, CVE-2024-46803, CVE-2024-42277, CVE-2024-43892, CVE-2024-45019, CVE-2024-44988, CVE-2024-46798, CVE-2024-44995, CVE-2024-43860, CVE-2024-46762, CVE-2024-43831, CVE-2024-44990, CVE-2024-46845, CVE-2024-46765, CVE-2024-45012, CVE-2024-44975, CVE-2024-46770, CVE-2024-46802, CVE-2024-44970, CVE-2024-46691, CVE-2024-43833, CVE-2024-43876, CVE-2024-42292, CVE-2024-42291, CVE-2024-43891, CVE-2024-46788, CVE-2024-44938, CVE-2024-46710, CVE-2024-42272, CVE-2024-43868, CVE-2024-43875, CVE-2024-45030, CVE-2024-46689, CVE-2024-46859, CVE-2024-46795, CVE-2024-46683, CVE-2024-44999, CVE-2024-44942, CVE-2024-47669, CVE-2024-42318, CVE-2024-43911, CVE-2024-46693, CVE-2024-42296, CVE-2024-43894, CVE-2024-45002, CVE-2024-46673, CVE-2024-46852, CVE-2024-45001, CVE-2024-43907, CVE-2024-42319, CVE-2024-44972, CVE-2024-43905, CVE-2024-45028, CVE-2024-46816, CVE-2024-46847, CVE-2024-46834, CVE-2024-44982, CVE-2024-46807, CVE-2024-44948, CVE-2024-46685, CVE-2024-46811, CVE-2024-42317, CVE-2024-43818, CVE-2024-46786, CVE-2024-43881, CVE-2024-42294, CVE-2024-46708, CVE-2024-42285, CVE-2024-44941, CVE-2024-43823, CVE-2024-46694, CVE-2024-46730, CVE-2024-42259, CVE-2024-42270, CVE-2024-47658, CVE-2024-46718, CVE-2024-44947, CVE-2024-46701, CVE-2024-43895, CVE-2024-43890, CVE-2024-46826, CVE-2024-46687, CVE-2024-46768, CVE-2024-45025, CVE-2024-42267, CVE-2024-42263, CVE-2024-44958, CVE-2024-44989, CVE-2024-43906, CVE-2024-43869, CVE-2024-43887, CVE-2024-42297, CVE-2024-46702, CVE-2024-42320, CVE-2024-42322, CVE-2024-46857, CVE-2024-43861, CVE-2024-45008, CVE-2024-44969, CVE-2024-46821, CVE-2024-44967, CVE-2024-43914, CVE-2024-46870, CVE-2024-46781, CVE-2024-43842, CVE-2024-47665, CVE-2024-46753, CVE-2024-43866, CVE-2024-43886, CVE-2024-44939, CVE-2024-42312, CVE-2024-46864, CVE-2024-46695, CVE-2024-46818, CVE-2024-45006, CVE-2024-43841, CVE-2024-46703, CVE-2024-46749, CVE-2024-44986, CVE-2024-46717, CVE-2024-42273, CVE-2024-43856, CVE-2024-46777, CVE-2024-44984, CVE-2024-46719, CVE-2024-46858, CVE-2024-43821, CVE-2024-46750, CVE-2024-43829, CVE-2024-43817, CVE-2024-42281, CVE-2024-42287, CVE-2024-45007, CVE-2024-46793, CVE-2024-45003, CVE-2024-45011, CVE-2024-47683, CVE-2024-44934, CVE-2024-46722, CVE-2024-46860, CVE-2024-42314, CVE-2024-46675, CVE-2024-43899, CVE-2024-46752, CVE-2024-46851, CVE-2024-42310, CVE-2024-46853, CVE-2024-39472, CVE-2024-43837, CVE-2024-45021, CVE-2024-46713, CVE-2024-44943, CVE-2024-46787, CVE-2024-43893, CVE-2024-44946, CVE-2024-45026, CVE-2024-44996, CVE-2024-46761, CVE-2024-46723, CVE-2024-42311, CVE-2024-42316, CVE-2024-47663, CVE-2024-44940, CVE-2024-43867, CVE-2024-42265, CVE-2024-44950, CVE-2024-46867, CVE-2024-45020, CVE-2024-46707, CVE-2024-44966, CVE-2024-42309, CVE-2024-46767, CVE-2024-46758, CVE-2024-46732, CVE-2024-42262, CVE-2024-46778, CVE-2024-43884, CVE-2024-44991, CVE-2024-47668, CVE-2024-46698, CVE-2024-46825, CVE-2024-42302, CVE-2024-46716, CVE-2024-46726, CVE-2024-43870, CVE-2024-42307, CVE-2024-46830, CVE-2024-43910, CVE-2024-46735, CVE-2024-43828, CVE-2024-43904, CVE-2024-44965, CVE-2024-46831, CVE-2024-44979, CVE-2024-44961, CVE-2024-46771, CVE-2024-46844, CVE-2024-46871, CVE-2024-43877, CVE-2024-46746, CVE-2024-44987, CVE-2024-46676, CVE-2024-46766, CVE-2024-46731, CVE-2024-46810, CVE-2024-46806, CVE-2024-45000, CVE-2024-42313, CVE-2024-45015, CVE-2024-46784, CVE-2024-43834, CVE-2024-46737, CVE-2024-46797, CVE-2024-43908, CVE-2024-46724, CVE-2024-44980, CVE-2024-43847, CVE-2024-46679, CVE-2024-46681, CVE-2024-43819, CVE-2024-46776, CVE-2024-44954, CVE-2024-45022, CVE-2024-46819, CVE-2024-46775, CVE-2024-43824, CVE-2024-44953, CVE-2024-46759, CVE-2024-43873, CVE-2024-46756, CVE-2024-42303, CVE-2024-46738, CVE-2024-42290, CVE-2024-42295, CVE-2024-43849, CVE-2024-44931, CVE-2024-46741, CVE-2024-43863, CVE-2024-44974, CVE-2024-46829, CVE-2024-44959, CVE-2024-42315, CVE-2024-44983, CVE-2024-46715, CVE-2024-46697, CVE-2024-43850, CVE-2024-46728, CVE-2024-44963, CVE-2024-46823, CVE-2024-46692, CVE-2024-46760, CVE-2024-46705, CVE-2024-42261, CVE-2024-42321, CVE-2024-46785, CVE-2024-46686, CVE-2024-49984, CVE-2024-46706, CVE-2024-45029, CVE-2024-46809, CVE-2024-43827, CVE-2024-44998, CVE-2024-47667, CVE-2024-43835, CVE-2024-46866, CVE-2024-46841, CVE-2024-42286, CVE-2024-43852, CVE-2024-43832, CVE-2024-46773, CVE-2024-46817, CVE-2024-46868, CVE-2024-46812, CVE-2024-47660, CVE-2024-46725, CVE-2024-42288, CVE-2024-46824, CVE-2024-42269, CVE-2024-44957, CVE-2024-45017, CVE-2024-46747, CVE-2024-47662, CVE-2024-46843, CVE-2024-46849, CVE-2024-43879, CVE-2024-46751, CVE-2024-42298, CVE-2024-46861, CVE-2024-44993, CVE-2024-46729, CVE-2024-46846, CVE-2024-46794, CVE-2024-43826, CVE-2024-44973, CVE-2024-46672, CVE-2024-44985, CVE-2024-46815, CVE-2024-46822, CVE-2024-46754, CVE-2024-43854, CVE-2024-42278, CVE-2024-46720, CVE-2024-46677, CVE-2024-46854, CVE-2024-43840, CVE-2024-43830, CVE-2024-46804, CVE-2024-45013, CVE-2024-46782, CVE-2024-46840, CVE-2024-44977, CVE-2024-46838, CVE-2024-42264, CVE-2024-47661, CVE-2024-43857, CVE-2023-52918, CVE-2024-44935, CVE-2024-46739, CVE-2024-43825, CVE-2024-43864, CVE-2024-47659, CVE-2024-42260, CVE-2024-44962, CVE-2024-46835, CVE-2024-43871, CVE-2024-47674, CVE-2024-46827, CVE-2024-42283, CVE-2024-42299, CVE-2024-46714, CVE-2024-46740, CVE-2024-46680, CVE-2024-46791, CVE-2024-43912, CVE-2024-46813, CVE-2024-46733, CVE-2024-47664, CVE-2024-42279, CVE-2024-46850, CVE-2024-42289, CVE-2024-46808, CVE-2024-43880, CVE-2024-46832, CVE-2024-42276, CVE-2024-44937, CVE-2024-42274, CVE-2024-46772, CVE-2024-47666, CVE-2024-44956, CVE-2024-46763, CVE-2024-46805, CVE-2023-52889, CVE-2024-46678, CVE-2024-43902, CVE-2024-46757, CVE-2024-46792, CVE-2024-42268, CVE-2024-43853, CVE-2024-45027, CVE-2024-42305, CVE-2024-46828, CVE-2024-43900, CVE-2024-46848, CVE-2024-46814, CVE-2024-46855, CVE-2024-46727, CVE-2024-46836, CVE-2024-46744, CVE-2024-46780, CVE-2024-46745, CVE-2024-42306) Update Instructions: Run `sudo pro fix USN-7154-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1015-gke - 6.8.0-1015.19 linux-gke - 6.8.0-1015.19 linux-gke-headers-6.8.0-1015 - 6.8.0-1015.19 linux-gke-tools-6.8.0-1015 - 6.8.0-1015.19 linux-headers-6.8.0-1015-gke - 6.8.0-1015.19 linux-headers-gke - 6.8.0-1015.19 linux-image-6.8.0-1015-gke - 6.8.0-1015.19 linux-image-gke - 6.8.0-1015.19 linux-image-unsigned-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-extra-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-iwlwifi-6.8.0-1015-gke - 6.8.0-1015.19 linux-modules-iwlwifi-gke - 6.8.0-1015.19 linux-tools-6.8.0-1015-gke - 6.8.0-1015.19 linux-tools-gke - 6.8.0-1015.19 No subscription required linux-buildinfo-6.8.0-1016-raspi - 6.8.0-1016.18 linux-headers-6.8.0-1016-raspi - 6.8.0-1016.18 linux-headers-raspi - 6.8.0-1016.18 linux-image-6.8.0-1016-raspi - 6.8.0-1016.18 linux-image-raspi - 6.8.0-1016.18 linux-modules-6.8.0-1016-raspi - 6.8.0-1016.18 linux-raspi - 6.8.0-1016.18 linux-raspi-headers-6.8.0-1016 - 6.8.0-1016.18 linux-raspi-tools-6.8.0-1016 - 6.8.0-1016.18 linux-tools-6.8.0-1016-raspi - 6.8.0-1016.18 linux-tools-raspi - 6.8.0-1016.18 No subscription required linux-buildinfo-6.8.0-1017-ibm - 6.8.0-1017.17 linux-headers-6.8.0-1017-ibm - 6.8.0-1017.17 linux-headers-ibm - 6.8.0-1017.17 linux-headers-ibm-classic - 6.8.0-1017.17 linux-headers-ibm-lts-24.04 - 6.8.0-1017.17 linux-ibm - 6.8.0-1017.17 linux-ibm-classic - 6.8.0-1017.17 linux-ibm-cloud-tools-common - 6.8.0-1017.17 linux-ibm-headers-6.8.0-1017 - 6.8.0-1017.17 linux-ibm-lts-24.04 - 6.8.0-1017.17 linux-ibm-source-6.8.0 - 6.8.0-1017.17 linux-ibm-tools-6.8.0-1017 - 6.8.0-1017.17 linux-image-6.8.0-1017-ibm - 6.8.0-1017.17 linux-image-ibm - 6.8.0-1017.17 linux-image-ibm-classic - 6.8.0-1017.17 linux-image-ibm-lts-24.04 - 6.8.0-1017.17 linux-image-unsigned-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-extra-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-6.8.0-1017-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-ibm - 6.8.0-1017.17 linux-modules-iwlwifi-ibm-classic - 6.8.0-1017.17 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1017.17 linux-tools-6.8.0-1017-ibm - 6.8.0-1017.17 linux-tools-ibm - 6.8.0-1017.17 linux-tools-ibm-classic - 6.8.0-1017.17 linux-tools-ibm-lts-24.04 - 6.8.0-1017.17 No subscription required linux-buildinfo-6.8.0-1017-oracle - 6.8.0-1017.18 linux-buildinfo-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-headers-6.8.0-1017-oracle - 6.8.0-1017.18 linux-headers-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-headers-oracle - 6.8.0-1017.18 linux-headers-oracle-64k - 6.8.0-1017.18 linux-image-6.8.0-1017-oracle - 6.8.0-1017.18 linux-image-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-image-oracle - 6.8.0-1017.18 linux-image-oracle-64k - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-oracle - 6.8.0-1017.18 linux-image-unsigned-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-modules-6.8.0-1017-oracle - 6.8.0-1017.18 linux-modules-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-oracle - 6.8.0-1017.18 linux-modules-extra-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-oracle - 6.8.0-1017.18 linux-oracle-64k - 6.8.0-1017.18 linux-oracle-headers-6.8.0-1017 - 6.8.0-1017.18 linux-oracle-tools-6.8.0-1017 - 6.8.0-1017.18 linux-tools-6.8.0-1017-oracle - 6.8.0-1017.18 linux-tools-6.8.0-1017-oracle-64k - 6.8.0-1017.18 linux-tools-oracle - 6.8.0-1017.18 linux-tools-oracle-64k - 6.8.0-1017.18 No subscription required linux-buildinfo-6.8.0-1018-oem - 6.8.0-1018.18 linux-headers-6.8.0-1018-oem - 6.8.0-1018.18 linux-headers-oem-24.04 - 6.8.0-1018.18 linux-headers-oem-24.04a - 6.8.0-1018.18 linux-image-6.8.0-1018-oem - 6.8.0-1018.18 linux-image-oem-24.04 - 6.8.0-1018.18 linux-image-oem-24.04a - 6.8.0-1018.18 linux-image-uc-6.8.0-1018-oem - 6.8.0-1018.18 linux-image-uc-oem-24.04 - 6.8.0-1018.18 linux-image-uc-oem-24.04a - 6.8.0-1018.18 linux-image-unsigned-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-ipu6-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-ipu6-oem-24.04 - 6.8.0-1018.18 linux-modules-ipu6-oem-24.04a - 6.8.0-1018.18 linux-modules-iwlwifi-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1018.18 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1018.18 linux-modules-usbio-6.8.0-1018-oem - 6.8.0-1018.18 linux-modules-usbio-oem-24.04 - 6.8.0-1018.18 linux-modules-usbio-oem-24.04a - 6.8.0-1018.18 linux-oem-24.04 - 6.8.0-1018.18 linux-oem-24.04a - 6.8.0-1018.18 linux-oem-6.8-headers-6.8.0-1018 - 6.8.0-1018.18 linux-oem-6.8-tools-6.8.0-1018 - 6.8.0-1018.18 linux-tools-6.8.0-1018-oem - 6.8.0-1018.18 linux-tools-oem-24.04 - 6.8.0-1018.18 linux-tools-oem-24.04a - 6.8.0-1018.18 No subscription required linux-buildinfo-6.8.0-1019-gcp - 6.8.0-1019.21 linux-gcp - 6.8.0-1019.21 linux-gcp-headers-6.8.0-1019 - 6.8.0-1019.21 linux-gcp-tools-6.8.0-1019 - 6.8.0-1019.21 linux-headers-6.8.0-1019-gcp - 6.8.0-1019.21 linux-headers-gcp - 6.8.0-1019.21 linux-image-6.8.0-1019-gcp - 6.8.0-1019.21 linux-image-gcp - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-gcp - 6.8.0-1019.21 linux-modules-extra-gcp - 6.8.0-1019.21 linux-tools-6.8.0-1019-gcp - 6.8.0-1019.21 linux-tools-gcp - 6.8.0-1019.21 No subscription required linux-aws - 6.8.0-1020.22 linux-aws-cloud-tools-6.8.0-1020 - 6.8.0-1020.22 linux-aws-headers-6.8.0-1020 - 6.8.0-1020.22 linux-aws-tools-6.8.0-1020 - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-aws - 6.8.0-1020.22 linux-cloud-tools-6.8.0-1020-aws - 6.8.0-1020.22 linux-headers-6.8.0-1020-aws - 6.8.0-1020.22 linux-headers-aws - 6.8.0-1020.22 linux-image-6.8.0-1020-aws - 6.8.0-1020.22 linux-image-aws - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-aws - 6.8.0-1020.22 linux-modules-extra-aws - 6.8.0-1020.22 linux-tools-6.8.0-1020-aws - 6.8.0-1020.22 linux-tools-aws - 6.8.0-1020.22 No subscription required linux-buildinfo-6.8.0-50-generic - 6.8.0-50.51 linux-buildinfo-6.8.0-50-generic-64k - 6.8.0-50.51 linux-cloud-tools-6.8.0-50 - 6.8.0-50.51 linux-cloud-tools-6.8.0-50-generic - 6.8.0-50.51 linux-cloud-tools-common - 6.8.0-50.51 linux-cloud-tools-generic - 6.8.0-50.51 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-50.51 linux-cloud-tools-virtual - 6.8.0-50.51 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-50.51 linux-crashdump - 6.8.0-50.51 linux-doc - 6.8.0-50.51 linux-generic - 6.8.0-50.51 linux-generic-64k - 6.8.0-50.51 linux-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-generic-hwe-24.04 - 6.8.0-50.51 linux-generic-lpae - 6.8.0-50.51 linux-headers-6.8.0-50 - 6.8.0-50.51 linux-headers-6.8.0-50-generic - 6.8.0-50.51 linux-headers-6.8.0-50-generic-64k - 6.8.0-50.51 linux-headers-generic - 6.8.0-50.51 linux-headers-generic-64k - 6.8.0-50.51 linux-headers-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-headers-generic-hwe-24.04 - 6.8.0-50.51 linux-headers-generic-lpae - 6.8.0-50.51 linux-headers-kvm - 6.8.0-50.51 linux-headers-laptop-23.10 - 6.8.0-50.51 linux-headers-oem-20.04 - 6.8.0-50.51 linux-headers-oem-20.04b - 6.8.0-50.51 linux-headers-oem-20.04c - 6.8.0-50.51 linux-headers-oem-20.04d - 6.8.0-50.51 linux-headers-oem-22.04 - 6.8.0-50.51 linux-headers-virtual - 6.8.0-50.51 linux-headers-virtual-hwe-24.04 - 6.8.0-50.51 linux-image-6.8.0-50-generic - 6.8.0-50.51 linux-image-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-extra-virtual - 6.8.0-50.51 linux-image-extra-virtual-hwe-24.04 - 6.8.0-50.51 linux-image-generic - 6.8.0-50.51 linux-image-generic-64k - 6.8.0-50.51 linux-image-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-image-generic-hwe-24.04 - 6.8.0-50.51 linux-image-generic-lpae - 6.8.0-50.51 linux-image-kvm - 6.8.0-50.51 linux-image-laptop-23.10 - 6.8.0-50.51 linux-image-oem-20.04 - 6.8.0-50.51 linux-image-oem-20.04b - 6.8.0-50.51 linux-image-oem-20.04c - 6.8.0-50.51 linux-image-oem-20.04d - 6.8.0-50.51 linux-image-oem-22.04 - 6.8.0-50.51 linux-image-uc-6.8.0-50-generic - 6.8.0-50.51 linux-image-uc-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-uc-generic - 6.8.0-50.51 linux-image-uc-generic-hwe-24.04 - 6.8.0-50.51 linux-image-unsigned-6.8.0-50-generic - 6.8.0-50.51 linux-image-unsigned-6.8.0-50-generic-64k - 6.8.0-50.51 linux-image-virtual - 6.8.0-50.51 linux-image-virtual-hwe-24.04 - 6.8.0-50.51 linux-kvm - 6.8.0-50.51 linux-laptop-23.10 - 6.8.0-50.51 linux-lib-rust-6.8.0-50-generic - 6.8.0-50.51 linux-libc-dev - 6.8.0-50.51 linux-modules-6.8.0-50-generic - 6.8.0-50.51 linux-modules-6.8.0-50-generic-64k - 6.8.0-50.51 linux-modules-extra-6.8.0-50-generic - 6.8.0-50.51 linux-modules-ipu6-6.8.0-50-generic - 6.8.0-50.51 linux-modules-ipu6-generic - 6.8.0-50.51 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-50.51 linux-modules-iwlwifi-6.8.0-50-generic - 6.8.0-50.51 linux-modules-iwlwifi-generic - 6.8.0-50.51 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-50.51 linux-modules-iwlwifi-oem-20.04 - 6.8.0-50.51 linux-modules-iwlwifi-oem-20.04d - 6.8.0-50.51 linux-modules-iwlwifi-oem-22.04 - 6.8.0-50.51 linux-modules-usbio-6.8.0-50-generic - 6.8.0-50.51 linux-modules-usbio-generic - 6.8.0-50.51 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-50.51 linux-oem-20.04 - 6.8.0-50.51 linux-oem-20.04b - 6.8.0-50.51 linux-oem-20.04c - 6.8.0-50.51 linux-oem-20.04d - 6.8.0-50.51 linux-oem-22.04 - 6.8.0-50.51 linux-source - 6.8.0-50.51 linux-source-6.8.0 - 6.8.0-50.51 linux-tools-6.8.0-50 - 6.8.0-50.51 linux-tools-6.8.0-50-generic - 6.8.0-50.51 linux-tools-6.8.0-50-generic-64k - 6.8.0-50.51 linux-tools-common - 6.8.0-50.51 linux-tools-generic - 6.8.0-50.51 linux-tools-generic-64k - 6.8.0-50.51 linux-tools-generic-64k-hwe-24.04 - 6.8.0-50.51 linux-tools-generic-hwe-24.04 - 6.8.0-50.51 linux-tools-generic-lpae - 6.8.0-50.51 linux-tools-host - 6.8.0-50.51 linux-tools-kvm - 6.8.0-50.51 linux-tools-laptop-23.10 - 6.8.0-50.51 linux-tools-oem-20.04 - 6.8.0-50.51 linux-tools-oem-20.04b - 6.8.0-50.51 linux-tools-oem-20.04c - 6.8.0-50.51 linux-tools-oem-20.04d - 6.8.0-50.51 linux-tools-oem-22.04 - 6.8.0-50.51 linux-tools-virtual - 6.8.0-50.51 linux-tools-virtual-hwe-24.04 - 6.8.0-50.51 linux-virtual - 6.8.0-50.51 linux-virtual-hwe-24.04 - 6.8.0-50.51 No subscription required linux-buildinfo-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-buildinfo-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-cloud-tools-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-cloud-tools-lowlatency - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-headers-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-headers-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-headers-lowlatency - 6.8.0-50.51.1 linux-headers-lowlatency-64k - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-headers-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-image-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-image-lowlatency - 6.8.0-50.51.1 linux-image-lowlatency-64k - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-image-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-image-unsigned-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-image-unsigned-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-lowlatency - 6.8.0-50.51.1 linux-lowlatency-64k - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-lowlatency-cloud-tools-6.8.0-50 - 6.8.0-50.51.1 linux-lowlatency-headers-6.8.0-50 - 6.8.0-50.51.1 linux-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-lowlatency-lib-rust-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-lowlatency-tools-6.8.0-50 - 6.8.0-50.51.1 linux-modules-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-modules-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-modules-iwlwifi-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 linux-tools-6.8.0-50-lowlatency - 6.8.0-50.51.1 linux-tools-6.8.0-50-lowlatency-64k - 6.8.0-50.51.1 linux-tools-lowlatency - 6.8.0-50.51.1 linux-tools-lowlatency-64k - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-50.51.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-50.51.1 linux-tools-lowlatency-hwe-24.04-edge - 6.8.0-50.51.1 No subscription required Medium CVE-2023-52889 CVE-2023-52918 CVE-2024-39472 CVE-2024-42258 CVE-2024-42259 CVE-2024-42260 CVE-2024-42261 CVE-2024-42262 CVE-2024-42263 CVE-2024-42264 CVE-2024-42265 CVE-2024-42267 CVE-2024-42268 CVE-2024-42269 CVE-2024-42270 CVE-2024-42272 CVE-2024-42273 CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42291 CVE-2024-42292 CVE-2024-42294 CVE-2024-42295 CVE-2024-42296 CVE-2024-42297 CVE-2024-42298 CVE-2024-42299 CVE-2024-42301 CVE-2024-42302 CVE-2024-42303 CVE-2024-42304 CVE-2024-42305 CVE-2024-42306 CVE-2024-42307 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315 CVE-2024-42316 CVE-2024-42317 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42321 CVE-2024-42322 CVE-2024-43817 CVE-2024-43818 CVE-2024-43819 CVE-2024-43820 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825 CVE-2024-43826 CVE-2024-43827 CVE-2024-43828 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43832 CVE-2024-43833 CVE-2024-43834 CVE-2024-43835 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841 CVE-2024-43842 CVE-2024-43843 CVE-2024-43845 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850 CVE-2024-43852 CVE-2024-43853 CVE-2024-43854 CVE-2024-43856 CVE-2024-43857 CVE-2024-43859 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864 CVE-2024-43866 CVE-2024-43867 CVE-2024-43868 CVE-2024-43869 CVE-2024-43870 CVE-2024-43871 CVE-2024-43873 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879 CVE-2024-43880 CVE-2024-43881 CVE-2024-43883 CVE-2024-43884 CVE-2024-43886 CVE-2024-43887 CVE-2024-43888 CVE-2024-43889 CVE-2024-43890 CVE-2024-43891 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43895 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902 CVE-2024-43904 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908 CVE-2024-43909 CVE-2024-43910 CVE-2024-43911 CVE-2024-43912 CVE-2024-43913 CVE-2024-43914 CVE-2024-44931 CVE-2024-44934 CVE-2024-44935 CVE-2024-44937 CVE-2024-44938 CVE-2024-44939 CVE-2024-44940 CVE-2024-44941 CVE-2024-44942 CVE-2024-44943 CVE-2024-44944 CVE-2024-44946 CVE-2024-44947 CVE-2024-44948 CVE-2024-44950 CVE-2024-44953 CVE-2024-44954 CVE-2024-44956 CVE-2024-44957 CVE-2024-44958 CVE-2024-44959 CVE-2024-44960 CVE-2024-44961 CVE-2024-44962 CVE-2024-44963 CVE-2024-44965 CVE-2024-44966 CVE-2024-44967 CVE-2024-44969 CVE-2024-44970 CVE-2024-44971 CVE-2024-44972 CVE-2024-44973 CVE-2024-44974 CVE-2024-44975 CVE-2024-44977 CVE-2024-44978 CVE-2024-44979 CVE-2024-44980 CVE-2024-44982 CVE-2024-44983 CVE-2024-44984 CVE-2024-44985 CVE-2024-44986 CVE-2024-44987 CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44991 CVE-2024-44993 CVE-2024-44995 CVE-2024-44996 CVE-2024-44998 CVE-2024-44999 CVE-2024-45000 CVE-2024-45001 CVE-2024-45002 CVE-2024-45003 CVE-2024-45005 CVE-2024-45006 CVE-2024-45007 CVE-2024-45008 CVE-2024-45009 CVE-2024-45010 CVE-2024-45011 CVE-2024-45012 CVE-2024-45013 CVE-2024-45015 CVE-2024-45017 CVE-2024-45018 CVE-2024-45019 CVE-2024-45020 CVE-2024-45021 CVE-2024-45022 CVE-2024-45025 CVE-2024-45026 CVE-2024-45027 CVE-2024-45028 CVE-2024-45029 CVE-2024-45030 CVE-2024-46672 CVE-2024-46673 CVE-2024-46675 CVE-2024-46676 CVE-2024-46677 CVE-2024-46678 CVE-2024-46679 CVE-2024-46680 CVE-2024-46681 CVE-2024-46683 CVE-2024-46685 CVE-2024-46686 CVE-2024-46687 CVE-2024-46689 CVE-2024-46691 CVE-2024-46692 CVE-2024-46693 CVE-2024-46694 CVE-2024-46695 CVE-2024-46697 CVE-2024-46698 CVE-2024-46701 CVE-2024-46702 CVE-2024-46703 CVE-2024-46705 CVE-2024-46706 CVE-2024-46707 CVE-2024-46708 CVE-2024-46709 CVE-2024-46710 CVE-2024-46711 CVE-2024-46713 CVE-2024-46714 CVE-2024-46715 CVE-2024-46716 CVE-2024-46717 CVE-2024-46718 CVE-2024-46719 CVE-2024-46720 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723 CVE-2024-46724 CVE-2024-46725 CVE-2024-46726 CVE-2024-46727 CVE-2024-46728 CVE-2024-46729 CVE-2024-46730 CVE-2024-46731 CVE-2024-46732 CVE-2024-46733 CVE-2024-46735 CVE-2024-46737 CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46741 CVE-2024-46743 CVE-2024-46744 CVE-2024-46745 CVE-2024-46746 CVE-2024-46747 CVE-2024-46749 CVE-2024-46750 CVE-2024-46751 CVE-2024-46752 CVE-2024-46753 CVE-2024-46754 CVE-2024-46755 CVE-2024-46759 CVE-2024-46760 CVE-2024-46761 CVE-2024-46762 CVE-2024-46763 CVE-2024-46765 CVE-2024-46766 CVE-2024-46767 CVE-2024-46768 CVE-2024-46770 CVE-2024-46771 CVE-2024-46772 CVE-2024-46773 CVE-2024-46774 CVE-2024-46775 CVE-2024-46776 CVE-2024-46777 CVE-2024-46778 CVE-2024-46779 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782 CVE-2024-46783 CVE-2024-46784 CVE-2024-46785 CVE-2024-46786 CVE-2024-46787 CVE-2024-46788 CVE-2024-46791 CVE-2024-46792 CVE-2024-46793 CVE-2024-46794 CVE-2024-46795 CVE-2024-46797 CVE-2024-46798 CVE-2024-46802 CVE-2024-46803 CVE-2024-46804 CVE-2024-46805 CVE-2024-46806 CVE-2024-46807 CVE-2024-46808 CVE-2024-46809 CVE-2024-46810 CVE-2024-46811 CVE-2024-46812 CVE-2024-46813 CVE-2024-46814 CVE-2024-46815 CVE-2024-46816 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822 CVE-2024-46823 CVE-2024-46824 CVE-2024-46825 CVE-2024-46826 CVE-2024-46827 CVE-2024-46828 CVE-2024-46829 CVE-2024-46830 CVE-2024-46831 CVE-2024-46832 CVE-2024-46834 CVE-2024-46835 CVE-2024-46836 CVE-2024-46838 CVE-2024-46840 CVE-2024-46841 CVE-2024-46842 CVE-2024-46843 CVE-2024-46844 CVE-2024-46845 CVE-2024-46846 CVE-2024-46847 CVE-2024-46848 CVE-2024-46849 CVE-2024-46850 CVE-2024-46851 CVE-2024-46852 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855 CVE-2024-46857 CVE-2024-46858 CVE-2024-46859 CVE-2024-46860 CVE-2024-46861 CVE-2024-46864 CVE-2024-46866 CVE-2024-46867 CVE-2024-46868 CVE-2024-46870 CVE-2024-46871 CVE-2024-47658 CVE-2024-47659 CVE-2024-47660 CVE-2024-47661 CVE-2024-47662 CVE-2024-47663 CVE-2024-47664 CVE-2024-47665 CVE-2024-47666 CVE-2024-47667 CVE-2024-47668 CVE-2024-47669 CVE-2024-47674 CVE-2024-47683 CVE-2024-49984 USN-7155-1 -- Linux kernel (NVIDIA) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-43845, CVE-2024-42311, CVE-2024-46757, CVE-2024-46738, CVE-2024-44961, CVE-2024-44935, CVE-2024-46845, CVE-2024-46783, CVE-2024-42315, CVE-2023-52918, CVE-2024-46708, CVE-2024-44934, CVE-2024-42298, CVE-2024-46786, CVE-2024-46778, CVE-2024-44960, CVE-2024-42295, CVE-2024-43881, CVE-2024-44971, CVE-2024-43849, CVE-2024-43914, CVE-2024-44962, CVE-2024-43841, CVE-2024-46794, CVE-2024-46752, CVE-2024-46853, CVE-2024-46861, CVE-2024-47664, CVE-2024-46717, CVE-2024-46806, CVE-2024-46797, CVE-2024-42261, CVE-2024-46828, CVE-2024-45013, CVE-2024-46870, CVE-2024-42258, CVE-2024-46689, CVE-2024-43818, CVE-2024-46762, CVE-2024-46825, CVE-2024-46698, CVE-2024-46816, CVE-2024-46728, CVE-2024-46726, CVE-2024-43835, CVE-2024-45000, CVE-2024-43850, CVE-2024-43840, CVE-2024-46846, CVE-2024-43846, CVE-2024-46725, CVE-2024-46867, CVE-2024-42310, CVE-2024-42274, CVE-2024-46760, CVE-2024-46683, CVE-2024-42304, CVE-2024-43839, CVE-2024-44954, CVE-2024-43895, CVE-2024-44967, CVE-2024-43889, CVE-2024-46854, CVE-2024-46860, CVE-2024-45029, CVE-2024-44938, CVE-2024-46785, CVE-2024-46713, CVE-2024-46715, CVE-2024-46731, CVE-2024-42297, CVE-2024-43912, CVE-2024-46751, CVE-2024-46711, CVE-2024-46695, CVE-2024-42317, CVE-2024-44957, CVE-2024-46792, CVE-2024-45020, CVE-2024-44985, CVE-2024-46746, CVE-2024-43868, CVE-2024-45017, CVE-2024-46824, CVE-2024-46787, CVE-2024-42288, CVE-2024-46681, CVE-2024-42306, CVE-2024-46755, CVE-2024-46826, CVE-2024-46777, CVE-2024-46844, CVE-2024-44972, CVE-2024-43883, CVE-2024-43909, CVE-2024-46676, CVE-2024-46798, CVE-2024-42273, CVE-2024-44990, CVE-2024-46744, CVE-2024-42305, CVE-2024-45006, CVE-2024-42309, CVE-2024-46722, CVE-2024-44956, CVE-2024-46739, CVE-2024-46680, CVE-2024-46765, CVE-2024-46714, CVE-2024-46771, CVE-2024-46847, CVE-2024-43879, CVE-2024-46703, CVE-2024-46733, CVE-2024-46815, CVE-2024-46802, CVE-2024-45027, CVE-2024-42281, CVE-2024-43891, CVE-2024-45030, CVE-2024-47662, CVE-2024-43887, CVE-2024-46836, CVE-2024-46782, CVE-2024-46835, CVE-2024-43907, CVE-2024-46779, CVE-2024-43869, CVE-2024-43821, CVE-2024-44978, CVE-2024-42286, CVE-2023-52889, CVE-2024-43852, CVE-2024-42320, CVE-2024-44931, CVE-2024-44993, CVE-2024-46829, CVE-2024-46701, CVE-2024-42272, CVE-2024-47660, CVE-2024-49984, CVE-2024-44973, CVE-2024-43817, CVE-2024-42322, CVE-2024-43830, CVE-2024-42301, CVE-2024-44969, CVE-2024-47674, CVE-2024-46702, CVE-2024-45025, CVE-2024-46710, CVE-2024-43866, CVE-2024-46718, CVE-2024-46773, CVE-2024-43834, CVE-2024-46754, CVE-2024-46871, CVE-2024-44942, CVE-2024-43913, CVE-2024-46818, CVE-2024-42318, CVE-2024-43831, CVE-2024-43832, CVE-2024-43908, CVE-2024-43827, CVE-2024-46737, CVE-2024-47665, CVE-2024-43854, CVE-2024-46707, CVE-2024-42303, CVE-2024-43860, CVE-2024-43824, CVE-2024-45019, CVE-2024-44984, CVE-2024-46813, CVE-2024-45022, CVE-2024-44970, CVE-2024-46791, CVE-2024-45012, CVE-2024-43829, CVE-2024-46850, CVE-2024-44987, CVE-2024-44940, CVE-2024-43864, CVE-2024-46723, CVE-2024-44999, CVE-2024-43884, CVE-2024-42287, CVE-2024-46675, CVE-2024-44974, CVE-2024-46721, CVE-2024-44937, CVE-2024-45008, CVE-2024-43853, CVE-2024-46697, CVE-2024-43899, CVE-2024-43823, CVE-2024-46747, CVE-2024-45007, CVE-2024-46822, CVE-2024-42262, CVE-2024-47661, CVE-2024-44953, CVE-2024-46859, CVE-2024-46694, CVE-2024-42279, CVE-2024-43873, CVE-2024-43828, CVE-2024-46851, CVE-2024-42296, CVE-2024-46719, CVE-2024-46677, CVE-2024-42259, CVE-2024-44941, CVE-2024-44946, CVE-2024-46745, CVE-2024-42299, CVE-2024-46724, CVE-2024-46749, CVE-2024-46706, CVE-2024-42267, CVE-2024-46774, CVE-2024-46685, CVE-2024-42292, CVE-2024-47667, CVE-2024-42319, CVE-2024-43888, CVE-2024-46729, CVE-2024-44947, CVE-2024-45003, CVE-2024-46827, CVE-2024-46693, CVE-2024-46705, CVE-2024-46767, CVE-2024-46838, CVE-2024-46805, CVE-2024-43904, CVE-2024-43906, CVE-2024-42265, CVE-2024-42278, CVE-2024-46750, CVE-2024-46692, CVE-2024-43847, CVE-2024-44995, CVE-2024-43825, CVE-2024-46803, CVE-2024-47669, CVE-2024-46830, CVE-2024-46784, CVE-2024-46840, CVE-2024-44939, CVE-2024-46848, CVE-2024-42313, CVE-2024-46823, CVE-2024-44989, CVE-2024-42270, CVE-2024-43856, CVE-2024-46716, CVE-2024-43859, CVE-2024-46841, CVE-2024-47658, CVE-2024-46811, CVE-2024-45028, CVE-2024-46781, CVE-2024-42290, CVE-2024-44991, CVE-2024-43894, CVE-2024-44979, CVE-2024-46804, CVE-2024-43826, CVE-2024-43877, CVE-2024-42284, CVE-2024-43876, CVE-2024-45011, CVE-2024-43819, CVE-2024-46709, CVE-2024-43867, CVE-2024-44963, CVE-2024-45010, CVE-2024-46753, CVE-2024-46759, CVE-2024-43880, CVE-2024-44977, CVE-2024-46772, CVE-2024-44950, CVE-2024-46687, CVE-2024-46834, CVE-2024-43911, CVE-2024-45015, CVE-2024-46819, CVE-2024-43875, CVE-2024-44996, CVE-2024-44988, CVE-2024-46673, CVE-2024-44943, CVE-2024-42316, CVE-2024-47683, CVE-2024-42307, CVE-2024-46788, CVE-2024-43892, CVE-2024-47659, CVE-2024-46857, CVE-2024-43820, CVE-2024-46832, CVE-2024-42312, CVE-2024-43910, CVE-2024-43886, CVE-2024-43905, CVE-2024-46766, CVE-2024-42263, CVE-2024-46821, CVE-2024-43842, CVE-2024-43857, CVE-2024-42276, CVE-2024-42268, CVE-2024-46740, CVE-2024-46843, CVE-2024-46807, CVE-2024-46780, CVE-2024-46678, CVE-2024-44944, CVE-2024-42264, CVE-2024-43863, CVE-2024-39472, CVE-2024-46691, CVE-2024-44959, CVE-2024-44958, CVE-2024-46679, CVE-2024-43843, CVE-2024-43900, CVE-2024-45021, CVE-2024-44982, CVE-2024-46793, CVE-2024-42260, CVE-2024-43890, CVE-2024-43871, CVE-2024-42269, CVE-2024-42277, CVE-2024-46720, CVE-2024-45005, CVE-2024-46727, CVE-2024-46808, CVE-2024-46852, CVE-2024-47668, CVE-2024-42321, CVE-2024-46743, CVE-2024-45002, CVE-2024-46763, CVE-2024-46817, CVE-2024-42285, CVE-2024-46770, CVE-2024-45026, CVE-2024-46768, CVE-2024-42314, CVE-2024-42291, CVE-2024-46756, CVE-2024-42283, CVE-2024-45018, CVE-2024-44966, CVE-2024-42289, CVE-2024-42294, CVE-2024-46814, CVE-2024-44986, CVE-2024-43870, CVE-2024-44980, CVE-2024-43902, CVE-2024-47666, CVE-2024-46864, CVE-2024-46761, CVE-2024-46831, CVE-2024-46758, CVE-2024-46735, CVE-2024-46858, CVE-2024-46795, CVE-2024-46810, CVE-2024-46849, CVE-2024-46775, CVE-2024-46868, CVE-2024-46809, CVE-2024-46776, CVE-2024-46866, CVE-2024-44983, CVE-2024-46741, CVE-2024-43837, CVE-2024-43833, CVE-2024-46672, CVE-2024-43861, CVE-2024-42302, CVE-2024-47663, CVE-2024-46812, CVE-2024-43893, CVE-2024-46686, CVE-2024-44948, CVE-2024-46732, CVE-2024-44965, CVE-2024-46855, CVE-2024-45009, CVE-2024-46842, CVE-2024-46730, CVE-2024-44975, CVE-2024-44998) Update Instructions: Run `sudo pro fix USN-7155-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-buildinfo-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-cloud-tools-nvidia - 6.8.0-1019.21 linux-headers-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-headers-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-headers-nvidia - 6.8.0-1019.21 linux-headers-nvidia-64k - 6.8.0-1019.21 linux-image-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-image-nvidia - 6.8.0-1019.21 linux-image-nvidia-64k - 6.8.0-1019.21 linux-image-uc-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-uc-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-image-unsigned-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-extra-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-modules-nvidia-fs-nvidia - 6.8.0-1019.21 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1019.21 linux-nvidia - 6.8.0-1019.21 linux-nvidia-64k - 6.8.0-1019.21 linux-nvidia-headers-6.8.0-1019 - 6.8.0-1019.21 linux-nvidia-tools-6.8.0-1019 - 6.8.0-1019.21 linux-tools-6.8.0-1019-nvidia - 6.8.0-1019.21 linux-tools-6.8.0-1019-nvidia-64k - 6.8.0-1019.21 linux-tools-nvidia - 6.8.0-1019.21 linux-tools-nvidia-64k - 6.8.0-1019.21 No subscription required linux-buildinfo-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-buildinfo-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-headers-nvidia-lowlatency - 6.8.0-1019.21.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-uc-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-uc-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-image-unsigned-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-image-unsigned-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-extra-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1019.21.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-nvidia-lowlatency - 6.8.0-1019.21.1 linux-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-nvidia-lowlatency-headers-6.8.0-1019 - 6.8.0-1019.21.1 linux-nvidia-lowlatency-tools-6.8.0-1019 - 6.8.0-1019.21.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1019.21.1 linux-tools-6.8.0-1019-nvidia-lowlatency - 6.8.0-1019.21.1 linux-tools-6.8.0-1019-nvidia-lowlatency-64k - 6.8.0-1019.21.1 linux-tools-nvidia-lowlatency - 6.8.0-1019.21.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1019.21.1 No subscription required Medium CVE-2023-52889 CVE-2023-52918 CVE-2024-39472 CVE-2024-42258 CVE-2024-42259 CVE-2024-42260 CVE-2024-42261 CVE-2024-42262 CVE-2024-42263 CVE-2024-42264 CVE-2024-42265 CVE-2024-42267 CVE-2024-42268 CVE-2024-42269 CVE-2024-42270 CVE-2024-42272 CVE-2024-42273 CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42291 CVE-2024-42292 CVE-2024-42294 CVE-2024-42295 CVE-2024-42296 CVE-2024-42297 CVE-2024-42298 CVE-2024-42299 CVE-2024-42301 CVE-2024-42302 CVE-2024-42303 CVE-2024-42304 CVE-2024-42305 CVE-2024-42306 CVE-2024-42307 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315 CVE-2024-42316 CVE-2024-42317 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42321 CVE-2024-42322 CVE-2024-43817 CVE-2024-43818 CVE-2024-43819 CVE-2024-43820 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825 CVE-2024-43826 CVE-2024-43827 CVE-2024-43828 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43832 CVE-2024-43833 CVE-2024-43834 CVE-2024-43835 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841 CVE-2024-43842 CVE-2024-43843 CVE-2024-43845 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850 CVE-2024-43852 CVE-2024-43853 CVE-2024-43854 CVE-2024-43856 CVE-2024-43857 CVE-2024-43859 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864 CVE-2024-43866 CVE-2024-43867 CVE-2024-43868 CVE-2024-43869 CVE-2024-43870 CVE-2024-43871 CVE-2024-43873 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879 CVE-2024-43880 CVE-2024-43881 CVE-2024-43883 CVE-2024-43884 CVE-2024-43886 CVE-2024-43887 CVE-2024-43888 CVE-2024-43889 CVE-2024-43890 CVE-2024-43891 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43895 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902 CVE-2024-43904 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908 CVE-2024-43909 CVE-2024-43910 CVE-2024-43911 CVE-2024-43912 CVE-2024-43913 CVE-2024-43914 CVE-2024-44931 CVE-2024-44934 CVE-2024-44935 CVE-2024-44937 CVE-2024-44938 CVE-2024-44939 CVE-2024-44940 CVE-2024-44941 CVE-2024-44942 CVE-2024-44943 CVE-2024-44944 CVE-2024-44946 CVE-2024-44947 CVE-2024-44948 CVE-2024-44950 CVE-2024-44953 CVE-2024-44954 CVE-2024-44956 CVE-2024-44957 CVE-2024-44958 CVE-2024-44959 CVE-2024-44960 CVE-2024-44961 CVE-2024-44962 CVE-2024-44963 CVE-2024-44965 CVE-2024-44966 CVE-2024-44967 CVE-2024-44969 CVE-2024-44970 CVE-2024-44971 CVE-2024-44972 CVE-2024-44973 CVE-2024-44974 CVE-2024-44975 CVE-2024-44977 CVE-2024-44978 CVE-2024-44979 CVE-2024-44980 CVE-2024-44982 CVE-2024-44983 CVE-2024-44984 CVE-2024-44985 CVE-2024-44986 CVE-2024-44987 CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44991 CVE-2024-44993 CVE-2024-44995 CVE-2024-44996 CVE-2024-44998 CVE-2024-44999 CVE-2024-45000 CVE-2024-45002 CVE-2024-45003 CVE-2024-45005 CVE-2024-45006 CVE-2024-45007 CVE-2024-45008 CVE-2024-45009 CVE-2024-45010 CVE-2024-45011 CVE-2024-45012 CVE-2024-45013 CVE-2024-45015 CVE-2024-45017 CVE-2024-45018 CVE-2024-45019 CVE-2024-45020 CVE-2024-45021 CVE-2024-45022 CVE-2024-45025 CVE-2024-45026 CVE-2024-45027 CVE-2024-45028 CVE-2024-45029 CVE-2024-45030 CVE-2024-46672 CVE-2024-46673 CVE-2024-46675 CVE-2024-46676 CVE-2024-46677 CVE-2024-46678 CVE-2024-46679 CVE-2024-46680 CVE-2024-46681 CVE-2024-46683 CVE-2024-46685 CVE-2024-46686 CVE-2024-46687 CVE-2024-46689 CVE-2024-46691 CVE-2024-46692 CVE-2024-46693 CVE-2024-46694 CVE-2024-46695 CVE-2024-46697 CVE-2024-46698 CVE-2024-46701 CVE-2024-46702 CVE-2024-46703 CVE-2024-46705 CVE-2024-46706 CVE-2024-46707 CVE-2024-46708 CVE-2024-46709 CVE-2024-46710 CVE-2024-46711 CVE-2024-46713 CVE-2024-46714 CVE-2024-46715 CVE-2024-46716 CVE-2024-46717 CVE-2024-46718 CVE-2024-46719 CVE-2024-46720 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723 CVE-2024-46724 CVE-2024-46725 CVE-2024-46726 CVE-2024-46727 CVE-2024-46728 CVE-2024-46729 CVE-2024-46730 CVE-2024-46731 CVE-2024-46732 CVE-2024-46733 CVE-2024-46735 CVE-2024-46737 CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46741 CVE-2024-46743 CVE-2024-46744 CVE-2024-46745 CVE-2024-46746 CVE-2024-46747 CVE-2024-46749 CVE-2024-46750 CVE-2024-46751 CVE-2024-46752 CVE-2024-46753 CVE-2024-46754 CVE-2024-46755 CVE-2024-46759 CVE-2024-46760 CVE-2024-46761 CVE-2024-46762 CVE-2024-46763 CVE-2024-46765 CVE-2024-46766 CVE-2024-46767 CVE-2024-46768 CVE-2024-46770 CVE-2024-46771 CVE-2024-46772 CVE-2024-46773 CVE-2024-46774 CVE-2024-46775 CVE-2024-46776 CVE-2024-46777 CVE-2024-46778 CVE-2024-46779 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782 CVE-2024-46783 CVE-2024-46784 CVE-2024-46785 CVE-2024-46786 CVE-2024-46787 CVE-2024-46788 CVE-2024-46791 CVE-2024-46792 CVE-2024-46793 CVE-2024-46794 CVE-2024-46795 CVE-2024-46797 CVE-2024-46798 CVE-2024-46802 CVE-2024-46803 CVE-2024-46804 CVE-2024-46805 CVE-2024-46806 CVE-2024-46807 CVE-2024-46808 CVE-2024-46809 CVE-2024-46810 CVE-2024-46811 CVE-2024-46812 CVE-2024-46813 CVE-2024-46814 CVE-2024-46815 CVE-2024-46816 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822 CVE-2024-46823 CVE-2024-46824 CVE-2024-46825 CVE-2024-46826 CVE-2024-46827 CVE-2024-46828 CVE-2024-46829 CVE-2024-46830 CVE-2024-46831 CVE-2024-46832 CVE-2024-46834 CVE-2024-46835 CVE-2024-46836 CVE-2024-46838 CVE-2024-46840 CVE-2024-46841 CVE-2024-46842 CVE-2024-46843 CVE-2024-46844 CVE-2024-46845 CVE-2024-46846 CVE-2024-46847 CVE-2024-46848 CVE-2024-46849 CVE-2024-46850 CVE-2024-46851 CVE-2024-46852 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855 CVE-2024-46857 CVE-2024-46858 CVE-2024-46859 CVE-2024-46860 CVE-2024-46861 CVE-2024-46864 CVE-2024-46866 CVE-2024-46867 CVE-2024-46868 CVE-2024-46870 CVE-2024-46871 CVE-2024-47658 CVE-2024-47659 CVE-2024-47660 CVE-2024-47661 CVE-2024-47662 CVE-2024-47663 CVE-2024-47664 CVE-2024-47665 CVE-2024-47666 CVE-2024-47667 CVE-2024-47668 CVE-2024-47669 CVE-2024-47674 CVE-2024-47683 CVE-2024-49984 USN-7156-1 -- Linux kernel (GKE) vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Android drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - Null block device driver; - Ublk userspace block driver; - Bluetooth drivers; - Cdrom driver; - Character device driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Cirrus firmware drivers; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - ISDN/mISDN subsystem; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Serial drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Syscall compatibility layer; - Memory Management; - Memory management; - Objagg library; - Perf events; - Syscall interfaces; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Closures library; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Ceph Core library; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Network traffic control; - SCTP protocol; - Sun RPC protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - MediaTek ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-43911, CVE-2024-46762, CVE-2024-46794, CVE-2024-43843, CVE-2024-42229, CVE-2024-43888, CVE-2024-44978, CVE-2024-46693, CVE-2024-46695, CVE-2024-42290, CVE-2024-42067, CVE-2024-45012, CVE-2024-42316, CVE-2024-47665, CVE-2024-41052, CVE-2024-42074, CVE-2024-41058, CVE-2024-44975, CVE-2024-46709, CVE-2024-46871, CVE-2024-42090, CVE-2024-42296, CVE-2024-42096, CVE-2024-42146, CVE-2024-46855, CVE-2024-39487, CVE-2024-43825, CVE-2024-42066, CVE-2024-42126, CVE-2024-41022, CVE-2024-41025, CVE-2023-52888, CVE-2024-46702, CVE-2024-42269, CVE-2024-41082, CVE-2024-42284, CVE-2024-42227, CVE-2024-41017, CVE-2024-42250, CVE-2024-46778, CVE-2024-47661, CVE-2024-46727, CVE-2024-46845, CVE-2024-44953, CVE-2024-47659, CVE-2024-42137, CVE-2024-42245, CVE-2024-41096, CVE-2024-46829, CVE-2024-41053, CVE-2024-46782, CVE-2024-44972, CVE-2024-41095, CVE-2024-42239, CVE-2024-42127, CVE-2024-42292, CVE-2024-46752, CVE-2024-46679, CVE-2024-41076, CVE-2024-46784, CVE-2024-46786, CVE-2024-46678, CVE-2024-44957, CVE-2024-46755, CVE-2024-47660, CVE-2024-41067, CVE-2024-46838, CVE-2024-43879, CVE-2024-45007, CVE-2024-45025, CVE-2024-45001, CVE-2024-41009, CVE-2024-41051, CVE-2024-46836, CVE-2024-49984, CVE-2024-45028, CVE-2024-43871, CVE-2024-46783, CVE-2024-42272, CVE-2024-42087, CVE-2024-46785, CVE-2024-42276, CVE-2024-47658, CVE-2024-46761, CVE-2024-46715, CVE-2024-46676, CVE-2024-43824, CVE-2024-42100, CVE-2024-46745, CVE-2024-41084, CVE-2024-41086, CVE-2024-45015, CVE-2024-46797, CVE-2024-42160, CVE-2024-46706, CVE-2024-46803, CVE-2024-46708, CVE-2024-47669, CVE-2024-45009, CVE-2024-41021, CVE-2024-42159, CVE-2024-42321, CVE-2024-46868, CVE-2024-41078, CVE-2024-42303, CVE-2024-45027, CVE-2024-42309, CVE-2024-43849, CVE-2024-43907, CVE-2024-43899, CVE-2024-43823, CVE-2024-42232, CVE-2024-44937, CVE-2024-41046, CVE-2024-42237, CVE-2024-42063, CVE-2024-42065, CVE-2024-42154, CVE-2024-42259, CVE-2024-46698, CVE-2024-46741, CVE-2024-45020, CVE-2024-42151, CVE-2024-41073, CVE-2024-46719, CVE-2024-42295, CVE-2024-46859, CVE-2024-41035, CVE-2024-46751, CVE-2024-47667, CVE-2024-46728, CVE-2024-46824, CVE-2024-42121, CVE-2024-46776, CVE-2024-46768, CVE-2024-43908, CVE-2024-43900, CVE-2024-46707, CVE-2024-44934, CVE-2024-41062, CVE-2024-42304, CVE-2024-42312, CVE-2024-42157, CVE-2024-41092, CVE-2024-41041, CVE-2024-43832, CVE-2024-41039, CVE-2024-44962, CVE-2024-46858, CVE-2024-43856, CVE-2024-41060, CVE-2024-45010, CVE-2024-41044, CVE-2024-44942, CVE-2024-42307, CVE-2024-44984, CVE-2024-41075, CVE-2024-43817, CVE-2024-46791, CVE-2024-46853, CVE-2024-42301, CVE-2024-44993, CVE-2024-41094, CVE-2024-27022, CVE-2024-41088, CVE-2024-43883, CVE-2024-41087, CVE-2024-46780, CVE-2024-42070, CVE-2024-44965, CVE-2024-46823, CVE-2024-46737, CVE-2024-44982, CVE-2024-46697, CVE-2024-45021, CVE-2024-44987, CVE-2024-41072, CVE-2024-41063, CVE-2024-46757, CVE-2024-46831, CVE-2024-44966, CVE-2024-42322, CVE-2024-42231, CVE-2024-46717, CVE-2024-41065, CVE-2024-44969, CVE-2023-52887, CVE-2024-42105, CVE-2024-44971, CVE-2024-46798, CVE-2024-42262, CVE-2024-44938, CVE-2024-42088, CVE-2024-44970, CVE-2024-43876, CVE-2024-46800, CVE-2024-42086, CVE-2024-43826, CVE-2024-46729, CVE-2024-46747, CVE-2024-46691, CVE-2024-46723, CVE-2024-41018, CVE-2024-42258, CVE-2024-41081, CVE-2024-41049, CVE-2024-43837, CVE-2024-45008, CVE-2024-41047, CVE-2024-41019, CVE-2024-42152, CVE-2024-41090, CVE-2024-46716, CVE-2024-42104, CVE-2024-46804, CVE-2024-43852, CVE-2024-42129, CVE-2024-46870, CVE-2024-41093, CVE-2024-45011, CVE-2024-41064, CVE-2024-46722, CVE-2024-42286, CVE-2024-45026, CVE-2024-46818, CVE-2024-42281, CVE-2024-43854, CVE-2024-41037, CVE-2024-44946, CVE-2024-41012, CVE-2024-41098, CVE-2024-42263, CVE-2024-42095, CVE-2024-46756, CVE-2024-43913, CVE-2024-46822, CVE-2024-44944, CVE-2024-42156, CVE-2024-42073, CVE-2024-42093, CVE-2024-44931, CVE-2024-42223, CVE-2024-42264, CVE-2024-42278, CVE-2024-46759, CVE-2024-46826, CVE-2024-43828, CVE-2024-42318, CVE-2024-42240, CVE-2024-45000, CVE-2024-43909, CVE-2024-46792, CVE-2024-42109, CVE-2024-43867, CVE-2024-42130, CVE-2024-42244, CVE-2024-44977, CVE-2024-46774, CVE-2024-41030, CVE-2024-42310, CVE-2024-42138, CVE-2024-42317, CVE-2024-42224, CVE-2024-46694, CVE-2024-46815, CVE-2024-46677, CVE-2024-46763, CVE-2024-46860, CVE-2024-46767, CVE-2024-42111, CVE-2024-41020, CVE-2024-46726, CVE-2024-42117, CVE-2024-43831, CVE-2024-42285, CVE-2024-46842, CVE-2024-43857, CVE-2024-41031, CVE-2024-43834, CVE-2024-42135, CVE-2024-42241, CVE-2024-46846, CVE-2024-44988, CVE-2024-43892, CVE-2024-44991, CVE-2024-46806, CVE-2024-41015, CVE-2024-43906, CVE-2024-42238, CVE-2024-46779, CVE-2024-41010, CVE-2024-41068, CVE-2024-46730, CVE-2024-46827, CVE-2024-42120, CVE-2024-41059, CVE-2024-46850, CVE-2023-52889, CVE-2024-45017, CVE-2024-45003, CVE-2024-46844, CVE-2024-46816, CVE-2024-46811, CVE-2024-41023, CVE-2024-44948, CVE-2024-46753, CVE-2024-45002, CVE-2024-42251, CVE-2024-46713, CVE-2024-42273, CVE-2024-46733, CVE-2024-46739, CVE-2024-42108, CVE-2024-41085, CVE-2024-41033, CVE-2024-42298, CVE-2024-46835, CVE-2024-39472, CVE-2024-47663, CVE-2024-43859, CVE-2024-43820, CVE-2024-42118, CVE-2024-41036, CVE-2024-47683, CVE-2024-42161, CVE-2024-42235, CVE-2024-43861, CVE-2024-43863, CVE-2024-47668, CVE-2024-46685, CVE-2024-43864, CVE-2024-46749, CVE-2024-44983, CVE-2024-46841, CVE-2024-42082, CVE-2024-43818, CVE-2024-41071, CVE-2024-45006, CVE-2024-42080, CVE-2024-46825, CVE-2024-46687, CVE-2024-44959, CVE-2024-43835, CVE-2024-43891, CVE-2024-46851, CVE-2024-42248, CVE-2024-42103, CVE-2024-42079, CVE-2024-42068, CVE-2024-47664, CVE-2024-46854, CVE-2024-44973, CVE-2024-42077, CVE-2024-46821, CVE-2024-43886, CVE-2024-41089, CVE-2024-43850, CVE-2024-44995, CVE-2024-46809, CVE-2024-42084, CVE-2024-46758, CVE-2024-47662, CVE-2024-43839, CVE-2024-46738, CVE-2024-41034, CVE-2024-42228, CVE-2024-42147, CVE-2024-43855, CVE-2024-41032, CVE-2024-46819, CVE-2024-44989, CVE-2024-42265, CVE-2024-42110, CVE-2024-42155, CVE-2024-45005, CVE-2024-45016, CVE-2024-42141, CVE-2024-43821, CVE-2024-42299, CVE-2024-44950, CVE-2024-42279, CVE-2024-44943, CVE-2024-43904, CVE-2024-42268, CVE-2024-42089, CVE-2024-46807, CVE-2024-44996, CVE-2024-42069, CVE-2024-46672, CVE-2024-44940, CVE-2024-42270, CVE-2024-46735, CVE-2024-42319, CVE-2024-46754, CVE-2024-46861, CVE-2024-42277, CVE-2024-41054, CVE-2024-42131, CVE-2024-41056, CVE-2024-44963, CVE-2024-42267, CVE-2024-42283, CVE-2024-42320, CVE-2024-46740, CVE-2024-46787, CVE-2024-43895, CVE-2024-43881, CVE-2024-44961, CVE-2024-43910, CVE-2024-43875, CVE-2024-42289, CVE-2024-43853, CVE-2024-42315, CVE-2024-43884, CVE-2024-46867, CVE-2024-43912, CVE-2024-41007, CVE-2024-46743, CVE-2024-46675, CVE-2024-43877, CVE-2024-39486, CVE-2024-41050, CVE-2024-43858, CVE-2024-45018, CVE-2024-46744, CVE-2024-46750, CVE-2024-46840, CVE-2024-42150, CVE-2024-41028, CVE-2024-42091, CVE-2024-43894, CVE-2024-43869, CVE-2024-42132, CVE-2024-46777, CVE-2024-42106, CVE-2024-46848, CVE-2024-41038, CVE-2024-46711, CVE-2024-43833, CVE-2024-46710, CVE-2024-46812, CVE-2024-42311, CVE-2024-46701, CVE-2024-46683, CVE-2024-45029, CVE-2024-46830, CVE-2024-46857, CVE-2024-44979, CVE-2024-44999, CVE-2024-44985, CVE-2024-46773, CVE-2024-45022, CVE-2024-46772, CVE-2024-44960, CVE-2024-42243, CVE-2024-42158, CVE-2024-43819, CVE-2024-45030, CVE-2024-42085, CVE-2024-42274, CVE-2024-44986, CVE-2024-41048, CVE-2024-42098, CVE-2024-46680, CVE-2023-52918, CVE-2024-46673, CVE-2024-46834, CVE-2024-42288, CVE-2024-44998, CVE-2024-42113, CVE-2024-42094, CVE-2024-42225, CVE-2024-42112, CVE-2024-42153, CVE-2024-43880, CVE-2024-43905, CVE-2024-43902, CVE-2024-46681, CVE-2024-42236, CVE-2024-42294, CVE-2024-46793, CVE-2024-43882, CVE-2024-44947, CVE-2024-46849, CVE-2024-44954, CVE-2024-46852, CVE-2024-41070, CVE-2024-41069, CVE-2024-46864, CVE-2024-46703, CVE-2024-43829, CVE-2024-46802, CVE-2024-42101, CVE-2024-44990, CVE-2024-43830, CVE-2024-41029, CVE-2024-43866, CVE-2024-43889, CVE-2024-42230, CVE-2024-46692, CVE-2024-42133, CVE-2024-45013, CVE-2024-42076, CVE-2024-46810, CVE-2024-42128, CVE-2024-46718, CVE-2024-46814, CVE-2024-43841, CVE-2024-43873, CVE-2024-42092, CVE-2024-41074, CVE-2024-41083, CVE-2024-46731, CVE-2024-43842, CVE-2024-41077, CVE-2024-46720, CVE-2024-46795, CVE-2024-46813, CVE-2024-46805, CVE-2024-42142, CVE-2024-42291, CVE-2024-43846, CVE-2024-41057, CVE-2024-43870, CVE-2024-44980, CVE-2024-46866, CVE-2024-43827, CVE-2024-43840, CVE-2024-42280, CVE-2024-42261, CVE-2024-42246, CVE-2024-42115, CVE-2024-46686, CVE-2024-43860, CVE-2024-46808, CVE-2024-42149, CVE-2024-46828, CVE-2024-44935, CVE-2024-43847, CVE-2024-44967, CVE-2024-46817, CVE-2024-46721, CVE-2024-42305, CVE-2024-46766, CVE-2024-43914, CVE-2024-46760, CVE-2024-41061, CVE-2024-41091, CVE-2024-43890, CVE-2024-42314, CVE-2024-42064, CVE-2024-42302, CVE-2024-43887, CVE-2024-46832, CVE-2024-46765, CVE-2024-46770, CVE-2024-41080, CVE-2024-42253, CVE-2024-44941, CVE-2024-42306, CVE-2024-41027, CVE-2024-46689, CVE-2024-46781, CVE-2024-42247, CVE-2024-41066, CVE-2024-42287, CVE-2024-41097, CVE-2024-44939, CVE-2024-45019, CVE-2024-47674, CVE-2024-46705, CVE-2024-42119, CVE-2024-46725, CVE-2024-46746, CVE-2024-46732, CVE-2024-41042, CVE-2024-44958, CVE-2024-42114, CVE-2024-43893, CVE-2024-47666, CVE-2024-46843, CVE-2024-42252, CVE-2024-42102, CVE-2024-42136, CVE-2024-41045, CVE-2024-42260, CVE-2024-46771, CVE-2024-42124, CVE-2024-42297, CVE-2024-42271, CVE-2024-43845, CVE-2024-46775, CVE-2024-41079, CVE-2024-43868, CVE-2024-42140, CVE-2024-42313, CVE-2024-42145, CVE-2024-46724, CVE-2024-46788, CVE-2024-42234, CVE-2024-42144, CVE-2024-44974, CVE-2024-42097, CVE-2024-46714, CVE-2024-41055, CVE-2024-44956) Update Instructions: Run `sudo pro fix USN-7156-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-cloud-tools-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-cloud-tools-gkeop - 6.8.0-1002.4 linux-cloud-tools-gkeop-6.8 - 6.8.0-1002.4 linux-gkeop - 6.8.0-1002.4 linux-gkeop-6.8 - 6.8.0-1002.4 linux-gkeop-cloud-tools-6.8.0-1002 - 6.8.0-1002.4 linux-gkeop-headers-6.8.0-1002 - 6.8.0-1002.4 linux-gkeop-tools-6.8.0-1002 - 6.8.0-1002.4 linux-headers-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-headers-gkeop - 6.8.0-1002.4 linux-headers-gkeop-6.8 - 6.8.0-1002.4 linux-image-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-image-gkeop - 6.8.0-1002.4 linux-image-gkeop-6.8 - 6.8.0-1002.4 linux-image-unsigned-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-extra-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-modules-extra-gkeop - 6.8.0-1002.4 linux-modules-extra-gkeop-6.8 - 6.8.0-1002.4 linux-tools-6.8.0-1002-gkeop - 6.8.0-1002.4 linux-tools-gkeop - 6.8.0-1002.4 linux-tools-gkeop-6.8 - 6.8.0-1002.4 No subscription required High CVE-2023-52887 CVE-2023-52888 CVE-2023-52889 CVE-2023-52918 CVE-2024-25741 CVE-2024-27022 CVE-2024-39472 CVE-2024-39486 CVE-2024-39487 CVE-2024-41007 CVE-2024-41009 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015 CVE-2024-41017 CVE-2024-41018 CVE-2024-41019 CVE-2024-41020 CVE-2024-41021 CVE-2024-41022 CVE-2024-41023 CVE-2024-41025 CVE-2024-41027 CVE-2024-41028 CVE-2024-41029 CVE-2024-41030 CVE-2024-41031 CVE-2024-41032 CVE-2024-41033 CVE-2024-41034 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037 CVE-2024-41038 CVE-2024-41039 CVE-2024-41041 CVE-2024-41042 CVE-2024-41044 CVE-2024-41045 CVE-2024-41046 CVE-2024-41047 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051 CVE-2024-41052 CVE-2024-41053 CVE-2024-41054 CVE-2024-41055 CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060 CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065 CVE-2024-41066 CVE-2024-41067 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076 CVE-2024-41077 CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41082 CVE-2024-41083 CVE-2024-41084 CVE-2024-41085 CVE-2024-41086 CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41090 CVE-2024-41091 CVE-2024-41092 CVE-2024-41093 CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098 CVE-2024-42063 CVE-2024-42064 CVE-2024-42065 CVE-2024-42066 CVE-2024-42067 CVE-2024-42068 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074 CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082 CVE-2024-42084 CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42088 CVE-2024-42089 CVE-2024-42090 CVE-2024-42091 CVE-2024-42092 CVE-2024-42093 CVE-2024-42094 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097 CVE-2024-42098 CVE-2024-42100 CVE-2024-42101 CVE-2024-42102 CVE-2024-42103 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106 CVE-2024-42108 CVE-2024-42109 CVE-2024-42110 CVE-2024-42111 CVE-2024-42112 CVE-2024-42113 CVE-2024-42114 CVE-2024-42115 CVE-2024-42117 CVE-2024-42118 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121 CVE-2024-42124 CVE-2024-42126 CVE-2024-42127 CVE-2024-42128 CVE-2024-42129 CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42135 CVE-2024-42136 CVE-2024-42137 CVE-2024-42138 CVE-2024-42140 CVE-2024-42141 CVE-2024-42142 CVE-2024-42144 CVE-2024-42145 CVE-2024-42146 CVE-2024-42147 CVE-2024-42149 CVE-2024-42150 CVE-2024-42151 CVE-2024-42152 CVE-2024-42153 CVE-2024-42154 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157 CVE-2024-42158 CVE-2024-42159 CVE-2024-42160 CVE-2024-42161 CVE-2024-42223 CVE-2024-42224 CVE-2024-42225 CVE-2024-42227 CVE-2024-42228 CVE-2024-42229 CVE-2024-42230 CVE-2024-42231 CVE-2024-42232 CVE-2024-42234 CVE-2024-42235 CVE-2024-42236 CVE-2024-42237 CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42243 CVE-2024-42244 CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42248 CVE-2024-42250 CVE-2024-42251 CVE-2024-42252 CVE-2024-42253 CVE-2024-42258 CVE-2024-42259 CVE-2024-42260 CVE-2024-42261 CVE-2024-42262 CVE-2024-42263 CVE-2024-42264 CVE-2024-42265 CVE-2024-42267 CVE-2024-42268 CVE-2024-42269 CVE-2024-42270 CVE-2024-42271 CVE-2024-42272 CVE-2024-42273 CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279 CVE-2024-42280 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42291 CVE-2024-42292 CVE-2024-42294 CVE-2024-42295 CVE-2024-42296 CVE-2024-42297 CVE-2024-42298 CVE-2024-42299 CVE-2024-42301 CVE-2024-42302 CVE-2024-42303 CVE-2024-42304 CVE-2024-42305 CVE-2024-42306 CVE-2024-42307 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315 CVE-2024-42316 CVE-2024-42317 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42321 CVE-2024-42322 CVE-2024-43817 CVE-2024-43818 CVE-2024-43819 CVE-2024-43820 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825 CVE-2024-43826 CVE-2024-43827 CVE-2024-43828 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43832 CVE-2024-43833 CVE-2024-43834 CVE-2024-43835 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841 CVE-2024-43842 CVE-2024-43843 CVE-2024-43845 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850 CVE-2024-43852 CVE-2024-43853 CVE-2024-43854 CVE-2024-43855 CVE-2024-43856 CVE-2024-43857 CVE-2024-43858 CVE-2024-43859 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864 CVE-2024-43866 CVE-2024-43867 CVE-2024-43868 CVE-2024-43869 CVE-2024-43870 CVE-2024-43871 CVE-2024-43873 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879 CVE-2024-43880 CVE-2024-43881 CVE-2024-43882 CVE-2024-43883 CVE-2024-43884 CVE-2024-43886 CVE-2024-43887 CVE-2024-43888 CVE-2024-43889 CVE-2024-43890 CVE-2024-43891 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43895 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902 CVE-2024-43904 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908 CVE-2024-43909 CVE-2024-43910 CVE-2024-43911 CVE-2024-43912 CVE-2024-43913 CVE-2024-43914 CVE-2024-44931 CVE-2024-44934 CVE-2024-44935 CVE-2024-44937 CVE-2024-44938 CVE-2024-44939 CVE-2024-44940 CVE-2024-44941 CVE-2024-44942 CVE-2024-44943 CVE-2024-44944 CVE-2024-44946 CVE-2024-44947 CVE-2024-44948 CVE-2024-44950 CVE-2024-44953 CVE-2024-44954 CVE-2024-44956 CVE-2024-44957 CVE-2024-44958 CVE-2024-44959 CVE-2024-44960 CVE-2024-44961 CVE-2024-44962 CVE-2024-44963 CVE-2024-44965 CVE-2024-44966 CVE-2024-44967 CVE-2024-44969 CVE-2024-44970 CVE-2024-44971 CVE-2024-44972 CVE-2024-44973 CVE-2024-44974 CVE-2024-44975 CVE-2024-44977 CVE-2024-44978 CVE-2024-44979 CVE-2024-44980 CVE-2024-44982 CVE-2024-44983 CVE-2024-44984 CVE-2024-44985 CVE-2024-44986 CVE-2024-44987 CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44991 CVE-2024-44993 CVE-2024-44995 CVE-2024-44996 CVE-2024-44998 CVE-2024-44999 CVE-2024-45000 CVE-2024-45001 CVE-2024-45002 CVE-2024-45003 CVE-2024-45005 CVE-2024-45006 CVE-2024-45007 CVE-2024-45008 CVE-2024-45009 CVE-2024-45010 CVE-2024-45011 CVE-2024-45012 CVE-2024-45013 CVE-2024-45015 CVE-2024-45016 CVE-2024-45017 CVE-2024-45018 CVE-2024-45019 CVE-2024-45020 CVE-2024-45021 CVE-2024-45022 CVE-2024-45025 CVE-2024-45026 CVE-2024-45027 CVE-2024-45028 CVE-2024-45029 CVE-2024-45030 CVE-2024-46672 CVE-2024-46673 CVE-2024-46675 CVE-2024-46676 CVE-2024-46677 CVE-2024-46678 CVE-2024-46679 CVE-2024-46680 CVE-2024-46681 CVE-2024-46683 CVE-2024-46685 CVE-2024-46686 CVE-2024-46687 CVE-2024-46689 CVE-2024-46691 CVE-2024-46692 CVE-2024-46693 CVE-2024-46694 CVE-2024-46695 CVE-2024-46697 CVE-2024-46698 CVE-2024-46701 CVE-2024-46702 CVE-2024-46703 CVE-2024-46705 CVE-2024-46706 CVE-2024-46707 CVE-2024-46708 CVE-2024-46709 CVE-2024-46710 CVE-2024-46711 CVE-2024-46713 CVE-2024-46714 CVE-2024-46715 CVE-2024-46716 CVE-2024-46717 CVE-2024-46718 CVE-2024-46719 CVE-2024-46720 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723 CVE-2024-46724 CVE-2024-46725 CVE-2024-46726 CVE-2024-46727 CVE-2024-46728 CVE-2024-46729 CVE-2024-46730 CVE-2024-46731 CVE-2024-46732 CVE-2024-46733 CVE-2024-46735 CVE-2024-46737 CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46741 CVE-2024-46743 CVE-2024-46744 CVE-2024-46745 CVE-2024-46746 CVE-2024-46747 CVE-2024-46749 CVE-2024-46750 CVE-2024-46751 CVE-2024-46752 CVE-2024-46753 CVE-2024-46754 CVE-2024-46755 CVE-2024-46759 CVE-2024-46760 CVE-2024-46761 CVE-2024-46762 CVE-2024-46763 CVE-2024-46765 CVE-2024-46766 CVE-2024-46767 CVE-2024-46768 CVE-2024-46770 CVE-2024-46771 CVE-2024-46772 CVE-2024-46773 CVE-2024-46774 CVE-2024-46775 CVE-2024-46776 CVE-2024-46777 CVE-2024-46778 CVE-2024-46779 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782 CVE-2024-46783 CVE-2024-46784 CVE-2024-46785 CVE-2024-46786 CVE-2024-46787 CVE-2024-46788 CVE-2024-46791 CVE-2024-46792 CVE-2024-46793 CVE-2024-46794 CVE-2024-46795 CVE-2024-46797 CVE-2024-46798 CVE-2024-46800 CVE-2024-46802 CVE-2024-46803 CVE-2024-46804 CVE-2024-46805 CVE-2024-46806 CVE-2024-46807 CVE-2024-46808 CVE-2024-46809 CVE-2024-46810 CVE-2024-46811 CVE-2024-46812 CVE-2024-46813 CVE-2024-46814 CVE-2024-46815 CVE-2024-46816 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822 CVE-2024-46823 CVE-2024-46824 CVE-2024-46825 CVE-2024-46826 CVE-2024-46827 CVE-2024-46828 CVE-2024-46829 CVE-2024-46830 CVE-2024-46831 CVE-2024-46832 CVE-2024-46834 CVE-2024-46835 CVE-2024-46836 CVE-2024-46838 CVE-2024-46840 CVE-2024-46841 CVE-2024-46842 CVE-2024-46843 CVE-2024-46844 CVE-2024-46845 CVE-2024-46846 CVE-2024-46848 CVE-2024-46849 CVE-2024-46850 CVE-2024-46851 CVE-2024-46852 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855 CVE-2024-46857 CVE-2024-46858 CVE-2024-46859 CVE-2024-46860 CVE-2024-46861 CVE-2024-46864 CVE-2024-46866 CVE-2024-46867 CVE-2024-46868 CVE-2024-46870 CVE-2024-46871 CVE-2024-47658 CVE-2024-47659 CVE-2024-47660 CVE-2024-47661 CVE-2024-47662 CVE-2024-47663 CVE-2024-47664 CVE-2024-47665 CVE-2024-47666 CVE-2024-47667 CVE-2024-47668 CVE-2024-47669 CVE-2024-47674 CVE-2024-47683 CVE-2024-49984 USN-7157-1 -- PHP vulnerabilities Ubuntu 24.04 LTS It was discovered that PHP incorrectly handled certain inputs when processed with convert.quoted-printable decode filters. An attacker could possibly use this issue to expose sensitive information or cause a crash. (CVE-2024-11233) It was discovered that PHP incorrectly handled certain HTTP requests. An attacker could possibly use this issue to performing arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user. (CVE-2024-11234) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2024-11236, CVE-2024-8932) It was discovered that PHP incorrectly handled certain MySQL requests. An attacker could possibly use this issue to cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server. (CVE-2024-8929) Update Instructions: Run `sudo pro fix USN-7157-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.3 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.3 php8.3 - 8.3.6-0ubuntu0.24.04.3 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.3 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.3 php8.3-cgi - 8.3.6-0ubuntu0.24.04.3 php8.3-cli - 8.3.6-0ubuntu0.24.04.3 php8.3-common - 8.3.6-0ubuntu0.24.04.3 php8.3-curl - 8.3.6-0ubuntu0.24.04.3 php8.3-dba - 8.3.6-0ubuntu0.24.04.3 php8.3-dev - 8.3.6-0ubuntu0.24.04.3 php8.3-enchant - 8.3.6-0ubuntu0.24.04.3 php8.3-fpm - 8.3.6-0ubuntu0.24.04.3 php8.3-gd - 8.3.6-0ubuntu0.24.04.3 php8.3-gmp - 8.3.6-0ubuntu0.24.04.3 php8.3-imap - 8.3.6-0ubuntu0.24.04.3 php8.3-interbase - 8.3.6-0ubuntu0.24.04.3 php8.3-intl - 8.3.6-0ubuntu0.24.04.3 php8.3-ldap - 8.3.6-0ubuntu0.24.04.3 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.3 php8.3-mysql - 8.3.6-0ubuntu0.24.04.3 php8.3-odbc - 8.3.6-0ubuntu0.24.04.3 php8.3-opcache - 8.3.6-0ubuntu0.24.04.3 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.3 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.3 php8.3-pspell - 8.3.6-0ubuntu0.24.04.3 php8.3-readline - 8.3.6-0ubuntu0.24.04.3 php8.3-snmp - 8.3.6-0ubuntu0.24.04.3 php8.3-soap - 8.3.6-0ubuntu0.24.04.3 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.3 php8.3-sybase - 8.3.6-0ubuntu0.24.04.3 php8.3-tidy - 8.3.6-0ubuntu0.24.04.3 php8.3-xml - 8.3.6-0ubuntu0.24.04.3 php8.3-xsl - 8.3.6-0ubuntu0.24.04.3 php8.3-zip - 8.3.6-0ubuntu0.24.04.3 No subscription required Medium CVE-2024-11233 CVE-2024-11234 CVE-2024-11236 CVE-2024-8929 CVE-2024-8932 USN-7158-1 -- Smarty vulnerabilities Ubuntu 24.04 LTS It was discovered that Smarty incorrectly handled query parameters in requests. An attacker could possibly use this issue to inject arbitrary Javascript code, resulting in denial of service or potential execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2018-25047, CVE-2023-28447) It was discovered that Smarty did not properly sanitize user input when generating templates. An attacker could, through PHP injection, possibly use this issue to execute arbitrary code. (CVE-2024-35226) Update Instructions: Run `sudo pro fix USN-7158-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smarty3 - 3.1.48-1ubuntu0.24.04.1 No subscription required High CVE-2018-25047 CVE-2023-28447 CVE-2024-35226 USN-7161-1 -- Docker vulnerabilities Ubuntu 24.04 LTS Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed for the source package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. This issue was only addressed for the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110) Update Instructions: Run `sudo pro fix USN-7161-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: docker-doc - 26.1.3-0ubuntu1~24.04.1+esm1 docker.io - 26.1.3-0ubuntu1~24.04.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-29018 CVE-2024-41110 USN-7161-3 -- Docker vulnerability Ubuntu 24.04 LTS USN-7161-1 and USN-7161-2 fixed CVE-2024-41110 for source package docker.io in Ubuntu 18.04 LTS and for source package docker.io-app in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. This update fixes it for source package docker.io in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. These updates only address the docker library and not the docker.io application itself, which was already patched in the previous USNs (USN-7161-1 and USN-7161-2). Original advisory details: Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed for the source package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. This issue was only addressed for the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110) Update Instructions: Run `sudo pro fix USN-7161-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-docker-docker-dev - 20.10.25+dfsg1-2ubuntu1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-41110 USN-7162-1 -- curl vulnerability Ubuntu 24.04 LTS Harry Sintonen discovered that curl incorrectly handled credentials from .netrc files when following HTTP redirects. In certain configurations, the password for the first host could be leaked to the followed-to host, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7162-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.6 libcurl3t64-gnutls - 8.5.0-2ubuntu10.6 libcurl4-doc - 8.5.0-2ubuntu10.6 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.6 libcurl4-openssl-dev - 8.5.0-2ubuntu10.6 libcurl4t64 - 8.5.0-2ubuntu10.6 No subscription required Low CVE-2024-11053 USN-7165-1 -- Spring Framework vulnerability Ubuntu 24.04 LTS It was discovered that the Spring Framework incorrectly handled web requests via data binding. An attacker could possibly use this issue to achieve remote code execution and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7165-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libspring-aop-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-beans-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-context-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-context-support-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-core-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-expression-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-instrument-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-jdbc-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-jms-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-messaging-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-orm-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-oxm-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-test-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-transaction-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-portlet-java - 4.3.30-2ubuntu0.24.04.1~esm1 libspring-web-servlet-java - 4.3.30-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2022-22965 USN-7167-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-50264, CVE-2024-49967, CVE-2024-53057) Update Instructions: Run `sudo pro fix USN-7167-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-cloud-tools-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-cloud-tools-gkeop - 6.8.0-1003.5 linux-cloud-tools-gkeop-6.8 - 6.8.0-1003.5 linux-gkeop - 6.8.0-1003.5 linux-gkeop-6.8 - 6.8.0-1003.5 linux-gkeop-cloud-tools-6.8.0-1003 - 6.8.0-1003.5 linux-gkeop-headers-6.8.0-1003 - 6.8.0-1003.5 linux-gkeop-tools-6.8.0-1003 - 6.8.0-1003.5 linux-headers-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-headers-gkeop - 6.8.0-1003.5 linux-headers-gkeop-6.8 - 6.8.0-1003.5 linux-image-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-image-gkeop - 6.8.0-1003.5 linux-image-gkeop-6.8 - 6.8.0-1003.5 linux-image-unsigned-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-extra-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-modules-extra-gkeop - 6.8.0-1003.5 linux-modules-extra-gkeop-6.8 - 6.8.0-1003.5 linux-tools-6.8.0-1003-gkeop - 6.8.0-1003.5 linux-tools-gkeop - 6.8.0-1003.5 linux-tools-gkeop-6.8 - 6.8.0-1003.5 No subscription required linux-buildinfo-6.8.0-1016-gke - 6.8.0-1016.20 linux-gke - 6.8.0-1016.20 linux-gke-headers-6.8.0-1016 - 6.8.0-1016.20 linux-gke-tools-6.8.0-1016 - 6.8.0-1016.20 linux-headers-6.8.0-1016-gke - 6.8.0-1016.20 linux-headers-gke - 6.8.0-1016.20 linux-image-6.8.0-1016-gke - 6.8.0-1016.20 linux-image-gke - 6.8.0-1016.20 linux-image-unsigned-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-extra-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-iwlwifi-6.8.0-1016-gke - 6.8.0-1016.20 linux-modules-iwlwifi-gke - 6.8.0-1016.20 linux-tools-6.8.0-1016-gke - 6.8.0-1016.20 linux-tools-gke - 6.8.0-1016.20 No subscription required linux-buildinfo-6.8.0-1017-raspi - 6.8.0-1017.19 linux-headers-6.8.0-1017-raspi - 6.8.0-1017.19 linux-headers-raspi - 6.8.0-1017.19 linux-image-6.8.0-1017-raspi - 6.8.0-1017.19 linux-image-raspi - 6.8.0-1017.19 linux-modules-6.8.0-1017-raspi - 6.8.0-1017.19 linux-raspi - 6.8.0-1017.19 linux-raspi-headers-6.8.0-1017 - 6.8.0-1017.19 linux-raspi-tools-6.8.0-1017 - 6.8.0-1017.19 linux-tools-6.8.0-1017-raspi - 6.8.0-1017.19 linux-tools-raspi - 6.8.0-1017.19 No subscription required linux-buildinfo-6.8.0-1018-ibm - 6.8.0-1018.18 linux-headers-6.8.0-1018-ibm - 6.8.0-1018.18 linux-headers-ibm - 6.8.0-1018.18 linux-headers-ibm-classic - 6.8.0-1018.18 linux-headers-ibm-lts-24.04 - 6.8.0-1018.18 linux-ibm - 6.8.0-1018.18 linux-ibm-classic - 6.8.0-1018.18 linux-ibm-cloud-tools-common - 6.8.0-1018.18 linux-ibm-headers-6.8.0-1018 - 6.8.0-1018.18 linux-ibm-lts-24.04 - 6.8.0-1018.18 linux-ibm-source-6.8.0 - 6.8.0-1018.18 linux-ibm-tools-6.8.0-1018 - 6.8.0-1018.18 linux-image-6.8.0-1018-ibm - 6.8.0-1018.18 linux-image-ibm - 6.8.0-1018.18 linux-image-ibm-classic - 6.8.0-1018.18 linux-image-ibm-lts-24.04 - 6.8.0-1018.18 linux-image-unsigned-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-extra-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-6.8.0-1018-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-ibm - 6.8.0-1018.18 linux-modules-iwlwifi-ibm-classic - 6.8.0-1018.18 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1018.18 linux-tools-6.8.0-1018-ibm - 6.8.0-1018.18 linux-tools-ibm - 6.8.0-1018.18 linux-tools-ibm-classic - 6.8.0-1018.18 linux-tools-ibm-lts-24.04 - 6.8.0-1018.18 No subscription required linux-buildinfo-6.8.0-1018-oracle - 6.8.0-1018.19 linux-buildinfo-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-headers-6.8.0-1018-oracle - 6.8.0-1018.19 linux-headers-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-headers-oracle - 6.8.0-1018.19 linux-headers-oracle-64k - 6.8.0-1018.19 linux-image-6.8.0-1018-oracle - 6.8.0-1018.19 linux-image-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-image-oracle - 6.8.0-1018.19 linux-image-oracle-64k - 6.8.0-1018.19 linux-image-unsigned-6.8.0-1018-oracle - 6.8.0-1018.19 linux-image-unsigned-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-modules-6.8.0-1018-oracle - 6.8.0-1018.19 linux-modules-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-modules-extra-6.8.0-1018-oracle - 6.8.0-1018.19 linux-modules-extra-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-oracle - 6.8.0-1018.19 linux-oracle-64k - 6.8.0-1018.19 linux-oracle-headers-6.8.0-1018 - 6.8.0-1018.19 linux-oracle-tools-6.8.0-1018 - 6.8.0-1018.19 linux-tools-6.8.0-1018-oracle - 6.8.0-1018.19 linux-tools-6.8.0-1018-oracle-64k - 6.8.0-1018.19 linux-tools-oracle - 6.8.0-1018.19 linux-tools-oracle-64k - 6.8.0-1018.19 No subscription required linux-buildinfo-6.8.0-1019-oem - 6.8.0-1019.19 linux-headers-6.8.0-1019-oem - 6.8.0-1019.19 linux-headers-oem-24.04 - 6.8.0-1019.19 linux-headers-oem-24.04a - 6.8.0-1019.19 linux-image-6.8.0-1019-oem - 6.8.0-1019.19 linux-image-oem-24.04 - 6.8.0-1019.19 linux-image-oem-24.04a - 6.8.0-1019.19 linux-image-uc-6.8.0-1019-oem - 6.8.0-1019.19 linux-image-uc-oem-24.04 - 6.8.0-1019.19 linux-image-uc-oem-24.04a - 6.8.0-1019.19 linux-image-unsigned-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-ipu6-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-ipu6-oem-24.04 - 6.8.0-1019.19 linux-modules-ipu6-oem-24.04a - 6.8.0-1019.19 linux-modules-iwlwifi-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1019.19 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1019.19 linux-modules-usbio-6.8.0-1019-oem - 6.8.0-1019.19 linux-modules-usbio-oem-24.04 - 6.8.0-1019.19 linux-modules-usbio-oem-24.04a - 6.8.0-1019.19 linux-oem-24.04 - 6.8.0-1019.19 linux-oem-24.04a - 6.8.0-1019.19 linux-oem-6.8-headers-6.8.0-1019 - 6.8.0-1019.19 linux-oem-6.8-tools-6.8.0-1019 - 6.8.0-1019.19 linux-tools-6.8.0-1019-oem - 6.8.0-1019.19 linux-tools-oem-24.04 - 6.8.0-1019.19 linux-tools-oem-24.04a - 6.8.0-1019.19 No subscription required linux-buildinfo-6.8.0-1020-gcp - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-buildinfo-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-cloud-tools-nvidia - 6.8.0-1020.22 linux-gcp - 6.8.0-1020.22 linux-gcp-headers-6.8.0-1020 - 6.8.0-1020.22 linux-gcp-tools-6.8.0-1020 - 6.8.0-1020.22 linux-headers-6.8.0-1020-gcp - 6.8.0-1020.22 linux-headers-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-headers-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-headers-gcp - 6.8.0-1020.22 linux-headers-nvidia - 6.8.0-1020.22 linux-headers-nvidia-64k - 6.8.0-1020.22 linux-image-6.8.0-1020-gcp - 6.8.0-1020.22 linux-image-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-image-gcp - 6.8.0-1020.22 linux-image-nvidia - 6.8.0-1020.22 linux-image-nvidia-64k - 6.8.0-1020.22 linux-image-uc-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-uc-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-gcp - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-image-unsigned-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-6.8.0-1020-gcp - 6.8.0-1020.22 linux-modules-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-gcp - 6.8.0-1020.22 linux-modules-extra-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-extra-gcp - 6.8.0-1020.22 linux-modules-nvidia-fs-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-modules-nvidia-fs-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-modules-nvidia-fs-nvidia - 6.8.0-1020.22 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1020.22 linux-nvidia - 6.8.0-1020.22 linux-nvidia-64k - 6.8.0-1020.22 linux-nvidia-headers-6.8.0-1020 - 6.8.0-1020.22 linux-nvidia-tools-6.8.0-1020 - 6.8.0-1020.22 linux-tools-6.8.0-1020-gcp - 6.8.0-1020.22 linux-tools-6.8.0-1020-nvidia - 6.8.0-1020.22 linux-tools-6.8.0-1020-nvidia-64k - 6.8.0-1020.22 linux-tools-gcp - 6.8.0-1020.22 linux-tools-nvidia - 6.8.0-1020.22 linux-tools-nvidia-64k - 6.8.0-1020.22 No subscription required linux-buildinfo-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-buildinfo-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-headers-nvidia-lowlatency - 6.8.0-1020.22.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-uc-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-uc-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-image-unsigned-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-image-unsigned-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-extra-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1020.22.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-nvidia-lowlatency - 6.8.0-1020.22.1 linux-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-nvidia-lowlatency-headers-6.8.0-1020 - 6.8.0-1020.22.1 linux-nvidia-lowlatency-tools-6.8.0-1020 - 6.8.0-1020.22.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1020.22.1 linux-tools-6.8.0-1020-nvidia-lowlatency - 6.8.0-1020.22.1 linux-tools-6.8.0-1020-nvidia-lowlatency-64k - 6.8.0-1020.22.1 linux-tools-nvidia-lowlatency - 6.8.0-1020.22.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1020.22.1 No subscription required linux-aws - 6.8.0-1021.23 linux-aws-cloud-tools-6.8.0-1021 - 6.8.0-1021.23 linux-aws-headers-6.8.0-1021 - 6.8.0-1021.23 linux-aws-tools-6.8.0-1021 - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-aws - 6.8.0-1021.23 linux-cloud-tools-6.8.0-1021-aws - 6.8.0-1021.23 linux-headers-6.8.0-1021-aws - 6.8.0-1021.23 linux-headers-aws - 6.8.0-1021.23 linux-image-6.8.0-1021-aws - 6.8.0-1021.23 linux-image-aws - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-aws - 6.8.0-1021.23 linux-modules-extra-aws - 6.8.0-1021.23 linux-tools-6.8.0-1021-aws - 6.8.0-1021.23 linux-tools-aws - 6.8.0-1021.23 No subscription required linux-buildinfo-6.8.0-51-generic - 6.8.0-51.52 linux-buildinfo-6.8.0-51-generic-64k - 6.8.0-51.52 linux-cloud-tools-6.8.0-51 - 6.8.0-51.52 linux-cloud-tools-6.8.0-51-generic - 6.8.0-51.52 linux-cloud-tools-common - 6.8.0-51.52 linux-cloud-tools-generic - 6.8.0-51.52 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-51.52 linux-cloud-tools-virtual - 6.8.0-51.52 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-51.52 linux-crashdump - 6.8.0-51.52 linux-doc - 6.8.0-51.52 linux-generic - 6.8.0-51.52 linux-generic-64k - 6.8.0-51.52 linux-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-generic-hwe-24.04 - 6.8.0-51.52 linux-generic-lpae - 6.8.0-51.52 linux-headers-6.8.0-51 - 6.8.0-51.52 linux-headers-6.8.0-51-generic - 6.8.0-51.52 linux-headers-6.8.0-51-generic-64k - 6.8.0-51.52 linux-headers-generic - 6.8.0-51.52 linux-headers-generic-64k - 6.8.0-51.52 linux-headers-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-headers-generic-hwe-24.04 - 6.8.0-51.52 linux-headers-generic-lpae - 6.8.0-51.52 linux-headers-kvm - 6.8.0-51.52 linux-headers-laptop-23.10 - 6.8.0-51.52 linux-headers-oem-20.04 - 6.8.0-51.52 linux-headers-oem-20.04b - 6.8.0-51.52 linux-headers-oem-20.04c - 6.8.0-51.52 linux-headers-oem-20.04d - 6.8.0-51.52 linux-headers-oem-22.04 - 6.8.0-51.52 linux-headers-virtual - 6.8.0-51.52 linux-headers-virtual-hwe-24.04 - 6.8.0-51.52 linux-image-6.8.0-51-generic - 6.8.0-51.52 linux-image-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-extra-virtual - 6.8.0-51.52 linux-image-extra-virtual-hwe-24.04 - 6.8.0-51.52 linux-image-generic - 6.8.0-51.52 linux-image-generic-64k - 6.8.0-51.52 linux-image-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-image-generic-hwe-24.04 - 6.8.0-51.52 linux-image-generic-lpae - 6.8.0-51.52 linux-image-kvm - 6.8.0-51.52 linux-image-laptop-23.10 - 6.8.0-51.52 linux-image-oem-20.04 - 6.8.0-51.52 linux-image-oem-20.04b - 6.8.0-51.52 linux-image-oem-20.04c - 6.8.0-51.52 linux-image-oem-20.04d - 6.8.0-51.52 linux-image-oem-22.04 - 6.8.0-51.52 linux-image-uc-6.8.0-51-generic - 6.8.0-51.52 linux-image-uc-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-uc-generic - 6.8.0-51.52 linux-image-uc-generic-hwe-24.04 - 6.8.0-51.52 linux-image-unsigned-6.8.0-51-generic - 6.8.0-51.52 linux-image-unsigned-6.8.0-51-generic-64k - 6.8.0-51.52 linux-image-virtual - 6.8.0-51.52 linux-image-virtual-hwe-24.04 - 6.8.0-51.52 linux-kvm - 6.8.0-51.52 linux-laptop-23.10 - 6.8.0-51.52 linux-lib-rust-6.8.0-51-generic - 6.8.0-51.52 linux-libc-dev - 6.8.0-51.52 linux-modules-6.8.0-51-generic - 6.8.0-51.52 linux-modules-6.8.0-51-generic-64k - 6.8.0-51.52 linux-modules-extra-6.8.0-51-generic - 6.8.0-51.52 linux-modules-ipu6-6.8.0-51-generic - 6.8.0-51.52 linux-modules-ipu6-generic - 6.8.0-51.52 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-51.52 linux-modules-iwlwifi-6.8.0-51-generic - 6.8.0-51.52 linux-modules-iwlwifi-generic - 6.8.0-51.52 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-51.52 linux-modules-iwlwifi-oem-20.04 - 6.8.0-51.52 linux-modules-iwlwifi-oem-20.04d - 6.8.0-51.52 linux-modules-iwlwifi-oem-22.04 - 6.8.0-51.52 linux-modules-usbio-6.8.0-51-generic - 6.8.0-51.52 linux-modules-usbio-generic - 6.8.0-51.52 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-51.52 linux-oem-20.04 - 6.8.0-51.52 linux-oem-20.04b - 6.8.0-51.52 linux-oem-20.04c - 6.8.0-51.52 linux-oem-20.04d - 6.8.0-51.52 linux-oem-22.04 - 6.8.0-51.52 linux-source - 6.8.0-51.52 linux-source-6.8.0 - 6.8.0-51.52 linux-tools-6.8.0-51 - 6.8.0-51.52 linux-tools-6.8.0-51-generic - 6.8.0-51.52 linux-tools-6.8.0-51-generic-64k - 6.8.0-51.52 linux-tools-common - 6.8.0-51.52 linux-tools-generic - 6.8.0-51.52 linux-tools-generic-64k - 6.8.0-51.52 linux-tools-generic-64k-hwe-24.04 - 6.8.0-51.52 linux-tools-generic-hwe-24.04 - 6.8.0-51.52 linux-tools-generic-lpae - 6.8.0-51.52 linux-tools-host - 6.8.0-51.52 linux-tools-kvm - 6.8.0-51.52 linux-tools-laptop-23.10 - 6.8.0-51.52 linux-tools-oem-20.04 - 6.8.0-51.52 linux-tools-oem-20.04b - 6.8.0-51.52 linux-tools-oem-20.04c - 6.8.0-51.52 linux-tools-oem-20.04d - 6.8.0-51.52 linux-tools-oem-22.04 - 6.8.0-51.52 linux-tools-virtual - 6.8.0-51.52 linux-tools-virtual-hwe-24.04 - 6.8.0-51.52 linux-virtual - 6.8.0-51.52 linux-virtual-hwe-24.04 - 6.8.0-51.52 No subscription required High CVE-2024-50264 CVE-2024-53057 USN-7167-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-50264, CVE-2024-49967, CVE-2024-53057) Update Instructions: Run `sudo pro fix USN-7167-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-buildinfo-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-cloud-tools-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-cloud-tools-lowlatency - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-headers-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-headers-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-headers-lowlatency - 6.8.0-51.52.1 linux-headers-lowlatency-64k - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-image-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-image-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-image-lowlatency - 6.8.0-51.52.1 linux-image-lowlatency-64k - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-image-unsigned-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-image-unsigned-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-lowlatency - 6.8.0-51.52.1 linux-lowlatency-64k - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-lowlatency-cloud-tools-6.8.0-51 - 6.8.0-51.52.1 linux-lowlatency-headers-6.8.0-51 - 6.8.0-51.52.1 linux-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-lowlatency-lib-rust-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-lowlatency-tools-6.8.0-51 - 6.8.0-51.52.1 linux-modules-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-modules-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-modules-iwlwifi-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-modules-iwlwifi-lowlatency - 6.8.0-51.52.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-51.52.1 linux-tools-6.8.0-51-lowlatency - 6.8.0-51.52.1 linux-tools-6.8.0-51-lowlatency-64k - 6.8.0-51.52.1 linux-tools-lowlatency - 6.8.0-51.52.1 linux-tools-lowlatency-64k - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-51.52.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-51.52.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-51.52.1 No subscription required High CVE-2024-50264 CVE-2024-53057 USN-7170-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Ext4 file system; - Network traffic control; - VMware vSockets driver; (CVE-2024-49914, CVE-2024-49912, CVE-2024-49919, CVE-2024-49905, CVE-2024-49909, CVE-2024-47704, CVE-2024-49916, CVE-2024-49908, CVE-2024-49899, CVE-2024-49923, CVE-2024-49921, CVE-2024-50264, CVE-2024-49911, CVE-2024-49893, CVE-2024-53057, CVE-2024-49904, CVE-2024-49898, CVE-2024-49907, CVE-2024-49897, CVE-2024-49913, CVE-2024-49967, CVE-2024-49922, CVE-2024-49920, CVE-2024-49896, CVE-2024-49906, CVE-2024-49917, CVE-2024-49910, CVE-2024-49915, CVE-2024-49918) Update Instructions: Run `sudo pro fix USN-7170-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1010-oem - 6.11.0-1010.10 linux-headers-6.11.0-1010-oem - 6.11.0-1010.10 linux-headers-oem-24.04b - 6.11.0-1010.10 linux-image-6.11.0-1010-oem - 6.11.0-1010.10 linux-image-oem-24.04b - 6.11.0-1010.10 linux-image-uc-6.11.0-1010-oem - 6.11.0-1010.10 linux-image-uc-oem-24.04b - 6.11.0-1010.10 linux-image-unsigned-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu6-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu6-oem-24.04b - 6.11.0-1010.10 linux-modules-ipu7-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-ipu7-oem-24.04b - 6.11.0-1010.10 linux-modules-iwlwifi-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1010.10 linux-modules-usbio-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-usbio-oem-24.04b - 6.11.0-1010.10 linux-modules-vision-6.11.0-1010-oem - 6.11.0-1010.10 linux-modules-vision-oem-24.04b - 6.11.0-1010.10 linux-oem-24.04b - 6.11.0-1010.10 linux-oem-6.11-headers-6.11.0-1010 - 6.11.0-1010.10 linux-oem-6.11-tools-6.11.0-1010 - 6.11.0-1010.10 linux-tools-6.11.0-1010-oem - 6.11.0-1010.10 linux-tools-oem-24.04b - 6.11.0-1010.10 No subscription required High CVE-2024-47704 CVE-2024-49893 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49899 CVE-2024-49904 CVE-2024-49905 CVE-2024-49906 CVE-2024-49907 CVE-2024-49908 CVE-2024-49909 CVE-2024-49910 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49915 CVE-2024-49916 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-50264 CVE-2024-53057 USN-7174-1 -- GStreamer vulnerability Ubuntu 24.04 LTS Antonio Morales discovered that GStreamer incorrectly handled allocating memory for certain buffers. An attacker could use this issue to cause GStreamer to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7174-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gstreamer-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-tools - 1.24.2-1ubuntu0.1 libgstreamer1.0-0 - 1.24.2-1ubuntu0.1 libgstreamer1.0-dev - 1.24.2-1ubuntu0.1 No subscription required Medium CVE-2024-47606 USN-7175-1 -- GStreamer Base Plugins vulnerabilities Ubuntu 24.04 LTS Antonio Morales discovered that GStreamer Base Plugins incorrectly handled certain malformed media files. An attacker could use these issues to cause GStreamer Base Plugins to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7175-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.2 gstreamer1.0-alsa - 1.24.2-1ubuntu0.2 gstreamer1.0-gl - 1.24.2-1ubuntu0.2 gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.2 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.2 gstreamer1.0-x - 1.24.2-1ubuntu0.2 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.2 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.2 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.2 No subscription required Medium CVE-2024-47538 CVE-2024-47541 CVE-2024-47542 CVE-2024-47600 CVE-2024-47607 CVE-2024-47615 CVE-2024-47835 USN-7176-1 -- GStreamer Good Plugins vulnerabilities Ubuntu 24.04 LTS Antonio Morales discovered that GStreamer Good Plugins incorrectly handled certain malformed media files. An attacker could use these issues to cause GStreamer Good Plugins to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7176-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-gtk3 - 1.24.2-1ubuntu1.1 gstreamer1.0-plugins-good - 1.24.2-1ubuntu1.1 gstreamer1.0-pulseaudio - 1.24.2-1ubuntu1.1 gstreamer1.0-qt5 - 1.24.2-1ubuntu1.1 gstreamer1.0-qt6 - 1.24.2-1ubuntu1.1 libgstreamer-plugins-good1.0-0 - 1.24.2-1ubuntu1.1 libgstreamer-plugins-good1.0-dev - 1.24.2-1ubuntu1.1 No subscription required Medium CVE-2024-47537 CVE-2024-47539 CVE-2024-47540 CVE-2024-47543 CVE-2024-47544 CVE-2024-47545 CVE-2024-47546 CVE-2024-47596 CVE-2024-47597 CVE-2024-47598 CVE-2024-47599 CVE-2024-47601 CVE-2024-47602 CVE-2024-47603 CVE-2024-47606 CVE-2024-47613 CVE-2024-47774 CVE-2024-47775 CVE-2024-47776 CVE-2024-47777 CVE-2024-47778 CVE-2024-47834 USN-7178-1 -- DPDK vulnerability Ubuntu 24.04 LTS It was discovered that DPDK incorrectly handled the Vhost library checksum offload feature. An malicious guest could possibly use this issue to cause the hypervisor's vSwitch to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7178-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dpdk - 23.11-1ubuntu0.1 dpdk-dev - 23.11-1ubuntu0.1 dpdk-doc - 23.11-1ubuntu0.1 libdpdk-dev - 23.11-1ubuntu0.1 librte-acl24 - 23.11-1ubuntu0.1 librte-baseband-acc24 - 23.11-1ubuntu0.1 librte-baseband-fpga-5gnr-fec24 - 23.11-1ubuntu0.1 librte-baseband-fpga-lte-fec24 - 23.11-1ubuntu0.1 librte-baseband-la12xx24 - 23.11-1ubuntu0.1 librte-baseband-null24 - 23.11-1ubuntu0.1 librte-baseband-turbo-sw24 - 23.11-1ubuntu0.1 librte-bbdev24 - 23.11-1ubuntu0.1 librte-bitratestats24 - 23.11-1ubuntu0.1 librte-bpf24 - 23.11-1ubuntu0.1 librte-bus-auxiliary24 - 23.11-1ubuntu0.1 librte-bus-cdx24 - 23.11-1ubuntu0.1 librte-bus-dpaa24 - 23.11-1ubuntu0.1 librte-bus-fslmc24 - 23.11-1ubuntu0.1 librte-bus-ifpga24 - 23.11-1ubuntu0.1 librte-bus-pci24 - 23.11-1ubuntu0.1 librte-bus-platform24 - 23.11-1ubuntu0.1 librte-bus-vdev24 - 23.11-1ubuntu0.1 librte-bus-vmbus24 - 23.11-1ubuntu0.1 librte-cfgfile24 - 23.11-1ubuntu0.1 librte-cmdline24 - 23.11-1ubuntu0.1 librte-common-cnxk24 - 23.11-1ubuntu0.1 librte-common-cpt24 - 23.11-1ubuntu0.1 librte-common-dpaax24 - 23.11-1ubuntu0.1 librte-common-iavf24 - 23.11-1ubuntu0.1 librte-common-idpf24 - 23.11-1ubuntu0.1 librte-common-mlx5-24 - 23.11-1ubuntu0.1 librte-common-nfp24 - 23.11-1ubuntu0.1 librte-common-octeontx24 - 23.11-1ubuntu0.1 librte-common-qat24 - 23.11-1ubuntu0.1 librte-common-sfc-efx24 - 23.11-1ubuntu0.1 librte-compress-isal24 - 23.11-1ubuntu0.1 librte-compress-mlx5-24 - 23.11-1ubuntu0.1 librte-compress-octeontx24 - 23.11-1ubuntu0.1 librte-compress-zlib24 - 23.11-1ubuntu0.1 librte-compressdev24 - 23.11-1ubuntu0.1 librte-crypto-bcmfs24 - 23.11-1ubuntu0.1 librte-crypto-caam-jr24 - 23.11-1ubuntu0.1 librte-crypto-ccp24 - 23.11-1ubuntu0.1 librte-crypto-cnxk24 - 23.11-1ubuntu0.1 librte-crypto-dpaa-sec24 - 23.11-1ubuntu0.1 librte-crypto-dpaa2-sec24 - 23.11-1ubuntu0.1 librte-crypto-ipsec-mb24 - 23.11-1ubuntu0.1 librte-crypto-mlx5-24 - 23.11-1ubuntu0.1 librte-crypto-nitrox24 - 23.11-1ubuntu0.1 librte-crypto-null24 - 23.11-1ubuntu0.1 librte-crypto-octeontx24 - 23.11-1ubuntu0.1 librte-crypto-openssl24 - 23.11-1ubuntu0.1 librte-crypto-scheduler24 - 23.11-1ubuntu0.1 librte-crypto-virtio24 - 23.11-1ubuntu0.1 librte-cryptodev24 - 23.11-1ubuntu0.1 librte-dispatcher24 - 23.11-1ubuntu0.1 librte-distributor24 - 23.11-1ubuntu0.1 librte-dma-cnxk24 - 23.11-1ubuntu0.1 librte-dma-dpaa2-24 - 23.11-1ubuntu0.1 librte-dma-dpaa24 - 23.11-1ubuntu0.1 librte-dma-hisilicon24 - 23.11-1ubuntu0.1 librte-dma-idxd24 - 23.11-1ubuntu0.1 librte-dma-ioat24 - 23.11-1ubuntu0.1 librte-dma-skeleton24 - 23.11-1ubuntu0.1 librte-dmadev24 - 23.11-1ubuntu0.1 librte-eal24 - 23.11-1ubuntu0.1 librte-efd24 - 23.11-1ubuntu0.1 librte-ethdev24 - 23.11-1ubuntu0.1 librte-event-cnxk24 - 23.11-1ubuntu0.1 librte-event-dlb2-24 - 23.11-1ubuntu0.1 librte-event-dpaa2-24 - 23.11-1ubuntu0.1 librte-event-dpaa24 - 23.11-1ubuntu0.1 librte-event-dsw24 - 23.11-1ubuntu0.1 librte-event-octeontx24 - 23.11-1ubuntu0.1 librte-event-opdl24 - 23.11-1ubuntu0.1 librte-event-skeleton24 - 23.11-1ubuntu0.1 librte-event-sw24 - 23.11-1ubuntu0.1 librte-eventdev24 - 23.11-1ubuntu0.1 librte-fib24 - 23.11-1ubuntu0.1 librte-gpudev24 - 23.11-1ubuntu0.1 librte-graph24 - 23.11-1ubuntu0.1 librte-gro24 - 23.11-1ubuntu0.1 librte-gso24 - 23.11-1ubuntu0.1 librte-hash24 - 23.11-1ubuntu0.1 librte-ip-frag24 - 23.11-1ubuntu0.1 librte-ipsec24 - 23.11-1ubuntu0.1 librte-jobstats24 - 23.11-1ubuntu0.1 librte-kvargs24 - 23.11-1ubuntu0.1 librte-latencystats24 - 23.11-1ubuntu0.1 librte-log24 - 23.11-1ubuntu0.1 librte-lpm24 - 23.11-1ubuntu0.1 librte-mbuf24 - 23.11-1ubuntu0.1 librte-member24 - 23.11-1ubuntu0.1 librte-mempool-bucket24 - 23.11-1ubuntu0.1 librte-mempool-cnxk24 - 23.11-1ubuntu0.1 librte-mempool-dpaa2-24 - 23.11-1ubuntu0.1 librte-mempool-dpaa24 - 23.11-1ubuntu0.1 librte-mempool-octeontx24 - 23.11-1ubuntu0.1 librte-mempool-ring24 - 23.11-1ubuntu0.1 librte-mempool-stack24 - 23.11-1ubuntu0.1 librte-mempool24 - 23.11-1ubuntu0.1 librte-meta-all - 23.11-1ubuntu0.1 librte-meta-allpmds - 23.11-1ubuntu0.1 librte-meta-baseband - 23.11-1ubuntu0.1 librte-meta-bus - 23.11-1ubuntu0.1 librte-meta-common - 23.11-1ubuntu0.1 librte-meta-compress - 23.11-1ubuntu0.1 librte-meta-crypto - 23.11-1ubuntu0.1 librte-meta-dma - 23.11-1ubuntu0.1 librte-meta-event - 23.11-1ubuntu0.1 librte-meta-mempool - 23.11-1ubuntu0.1 librte-meta-net - 23.11-1ubuntu0.1 librte-meta-raw - 23.11-1ubuntu0.1 librte-meter24 - 23.11-1ubuntu0.1 librte-metrics24 - 23.11-1ubuntu0.1 librte-ml-cnxk24 - 23.11-1ubuntu0.1 librte-mldev24 - 23.11-1ubuntu0.1 librte-net-af-packet24 - 23.11-1ubuntu0.1 librte-net-af-xdp24 - 23.11-1ubuntu0.1 librte-net-ark24 - 23.11-1ubuntu0.1 librte-net-atlantic24 - 23.11-1ubuntu0.1 librte-net-avp24 - 23.11-1ubuntu0.1 librte-net-axgbe24 - 23.11-1ubuntu0.1 librte-net-bnx2x24 - 23.11-1ubuntu0.1 librte-net-bnxt24 - 23.11-1ubuntu0.1 librte-net-bond24 - 23.11-1ubuntu0.1 librte-net-cnxk24 - 23.11-1ubuntu0.1 librte-net-cpfl24 - 23.11-1ubuntu0.1 librte-net-cxgbe24 - 23.11-1ubuntu0.1 librte-net-dpaa2-24 - 23.11-1ubuntu0.1 librte-net-dpaa24 - 23.11-1ubuntu0.1 librte-net-e1000-24 - 23.11-1ubuntu0.1 librte-net-ena24 - 23.11-1ubuntu0.1 librte-net-enetc24 - 23.11-1ubuntu0.1 librte-net-enetfec24 - 23.11-1ubuntu0.1 librte-net-enic24 - 23.11-1ubuntu0.1 librte-net-failsafe24 - 23.11-1ubuntu0.1 librte-net-fm10k24 - 23.11-1ubuntu0.1 librte-net-gve24 - 23.11-1ubuntu0.1 librte-net-hinic24 - 23.11-1ubuntu0.1 librte-net-hns3-24 - 23.11-1ubuntu0.1 librte-net-i40e24 - 23.11-1ubuntu0.1 librte-net-iavf24 - 23.11-1ubuntu0.1 librte-net-ice24 - 23.11-1ubuntu0.1 librte-net-idpf24 - 23.11-1ubuntu0.1 librte-net-igc24 - 23.11-1ubuntu0.1 librte-net-ionic24 - 23.11-1ubuntu0.1 librte-net-ipn3ke24 - 23.11-1ubuntu0.1 librte-net-ixgbe24 - 23.11-1ubuntu0.1 librte-net-mana24 - 23.11-1ubuntu0.1 librte-net-memif24 - 23.11-1ubuntu0.1 librte-net-mlx4-24 - 23.11-1ubuntu0.1 librte-net-mlx5-24 - 23.11-1ubuntu0.1 librte-net-netvsc24 - 23.11-1ubuntu0.1 librte-net-nfp24 - 23.11-1ubuntu0.1 librte-net-ngbe24 - 23.11-1ubuntu0.1 librte-net-null24 - 23.11-1ubuntu0.1 librte-net-octeon-ep24 - 23.11-1ubuntu0.1 librte-net-octeontx24 - 23.11-1ubuntu0.1 librte-net-pcap24 - 23.11-1ubuntu0.1 librte-net-pfe24 - 23.11-1ubuntu0.1 librte-net-qede24 - 23.11-1ubuntu0.1 librte-net-ring24 - 23.11-1ubuntu0.1 librte-net-sfc24 - 23.11-1ubuntu0.1 librte-net-softnic24 - 23.11-1ubuntu0.1 librte-net-tap24 - 23.11-1ubuntu0.1 librte-net-thunderx24 - 23.11-1ubuntu0.1 librte-net-txgbe24 - 23.11-1ubuntu0.1 librte-net-vdev-netvsc24 - 23.11-1ubuntu0.1 librte-net-vhost24 - 23.11-1ubuntu0.1 librte-net-virtio24 - 23.11-1ubuntu0.1 librte-net-vmxnet3-24 - 23.11-1ubuntu0.1 librte-net24 - 23.11-1ubuntu0.1 librte-node24 - 23.11-1ubuntu0.1 librte-pcapng24 - 23.11-1ubuntu0.1 librte-pci24 - 23.11-1ubuntu0.1 librte-pdcp24 - 23.11-1ubuntu0.1 librte-pdump24 - 23.11-1ubuntu0.1 librte-pipeline24 - 23.11-1ubuntu0.1 librte-port24 - 23.11-1ubuntu0.1 librte-power24 - 23.11-1ubuntu0.1 librte-raw-cnxk-bphy24 - 23.11-1ubuntu0.1 librte-raw-cnxk-gpio24 - 23.11-1ubuntu0.1 librte-raw-dpaa2-cmdif24 - 23.11-1ubuntu0.1 librte-raw-ifpga24 - 23.11-1ubuntu0.1 librte-raw-ntb24 - 23.11-1ubuntu0.1 librte-raw-skeleton24 - 23.11-1ubuntu0.1 librte-rawdev24 - 23.11-1ubuntu0.1 librte-rcu24 - 23.11-1ubuntu0.1 librte-regex-cn9k24 - 23.11-1ubuntu0.1 librte-regex-mlx5-24 - 23.11-1ubuntu0.1 librte-regexdev24 - 23.11-1ubuntu0.1 librte-reorder24 - 23.11-1ubuntu0.1 librte-rib24 - 23.11-1ubuntu0.1 librte-ring24 - 23.11-1ubuntu0.1 librte-sched24 - 23.11-1ubuntu0.1 librte-security24 - 23.11-1ubuntu0.1 librte-stack24 - 23.11-1ubuntu0.1 librte-table24 - 23.11-1ubuntu0.1 librte-telemetry24 - 23.11-1ubuntu0.1 librte-timer24 - 23.11-1ubuntu0.1 librte-vdpa-ifc24 - 23.11-1ubuntu0.1 librte-vdpa-mlx5-24 - 23.11-1ubuntu0.1 librte-vdpa-nfp24 - 23.11-1ubuntu0.1 librte-vdpa-sfc24 - 23.11-1ubuntu0.1 librte-vhost24 - 23.11-1ubuntu0.1 No subscription required Medium CVE-2024-11614 USN-7182-1 -- Ceph vulnerability Ubuntu 24.04 LTS It was discovered that Ceph incorrectly handled unsupported JWT algorithms in the RadosGW gateway. An attacker could possibly use this issue to bypass certain authentication checks and restrictions. Update Instructions: Run `sudo pro fix USN-7182-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ceph - 19.2.0-0ubuntu0.24.04.2 ceph-base - 19.2.0-0ubuntu0.24.04.2 ceph-common - 19.2.0-0ubuntu0.24.04.2 ceph-fuse - 19.2.0-0ubuntu0.24.04.2 ceph-grafana-dashboards - 19.2.0-0ubuntu0.24.04.2 ceph-immutable-object-cache - 19.2.0-0ubuntu0.24.04.2 ceph-mds - 19.2.0-0ubuntu0.24.04.2 ceph-mgr - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-cephadm - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-dashboard - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-diskprediction-local - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-k8sevents - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-modules-core - 19.2.0-0ubuntu0.24.04.2 ceph-mgr-rook - 19.2.0-0ubuntu0.24.04.2 ceph-mon - 19.2.0-0ubuntu0.24.04.2 ceph-osd - 19.2.0-0ubuntu0.24.04.2 ceph-prometheus-alerts - 19.2.0-0ubuntu0.24.04.2 ceph-resource-agents - 19.2.0-0ubuntu0.24.04.2 ceph-volume - 19.2.0-0ubuntu0.24.04.2 cephadm - 19.2.0-0ubuntu0.24.04.2 cephfs-mirror - 19.2.0-0ubuntu0.24.04.2 cephfs-shell - 19.2.0-0ubuntu0.24.04.2 crimson-osd - 19.2.0-0ubuntu0.24.04.2 libcephfs-dev - 19.2.0-0ubuntu0.24.04.2 libcephfs-java - 19.2.0-0ubuntu0.24.04.2 libcephfs-jni - 19.2.0-0ubuntu0.24.04.2 libcephfs2 - 19.2.0-0ubuntu0.24.04.2 librados-dev - 19.2.0-0ubuntu0.24.04.2 librados2 - 19.2.0-0ubuntu0.24.04.2 libradospp-dev - 19.2.0-0ubuntu0.24.04.2 libradosstriper-dev - 19.2.0-0ubuntu0.24.04.2 libradosstriper1 - 19.2.0-0ubuntu0.24.04.2 librbd-dev - 19.2.0-0ubuntu0.24.04.2 librbd1 - 19.2.0-0ubuntu0.24.04.2 librgw-dev - 19.2.0-0ubuntu0.24.04.2 librgw2 - 19.2.0-0ubuntu0.24.04.2 libsqlite3-mod-ceph - 19.2.0-0ubuntu0.24.04.2 libsqlite3-mod-ceph-dev - 19.2.0-0ubuntu0.24.04.2 python3-ceph - 19.2.0-0ubuntu0.24.04.2 python3-ceph-argparse - 19.2.0-0ubuntu0.24.04.2 python3-ceph-common - 19.2.0-0ubuntu0.24.04.2 python3-cephfs - 19.2.0-0ubuntu0.24.04.2 python3-rados - 19.2.0-0ubuntu0.24.04.2 python3-rbd - 19.2.0-0ubuntu0.24.04.2 python3-rgw - 19.2.0-0ubuntu0.24.04.2 rados-objclass-dev - 19.2.0-0ubuntu0.24.04.2 radosgw - 19.2.0-0ubuntu0.24.04.2 rbd-fuse - 19.2.0-0ubuntu0.24.04.2 rbd-mirror - 19.2.0-0ubuntu0.24.04.2 rbd-nbd - 19.2.0-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-48916 USN-7187-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - Intel ASoC drivers; (CVE-2024-50011, CVE-2024-47715) Update Instructions: Run `sudo pro fix USN-7187-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1011-oem - 6.11.0-1011.11 linux-headers-6.11.0-1011-oem - 6.11.0-1011.11 linux-headers-oem-24.04b - 6.11.0-1011.11 linux-image-6.11.0-1011-oem - 6.11.0-1011.11 linux-image-oem-24.04b - 6.11.0-1011.11 linux-image-uc-6.11.0-1011-oem - 6.11.0-1011.11 linux-image-uc-oem-24.04b - 6.11.0-1011.11 linux-image-unsigned-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu6-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu6-oem-24.04b - 6.11.0-1011.11 linux-modules-ipu7-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-ipu7-oem-24.04b - 6.11.0-1011.11 linux-modules-iwlwifi-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1011.11 linux-modules-usbio-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-usbio-oem-24.04b - 6.11.0-1011.11 linux-modules-vision-6.11.0-1011-oem - 6.11.0-1011.11 linux-modules-vision-oem-24.04b - 6.11.0-1011.11 linux-oem-24.04b - 6.11.0-1011.11 linux-oem-6.11-headers-6.11.0-1011 - 6.11.0-1011.11 linux-oem-6.11-tools-6.11.0-1011 - 6.11.0-1011.11 linux-tools-6.11.0-1011-oem - 6.11.0-1011.11 linux-tools-oem-24.04b - 6.11.0-1011.11 No subscription required Medium CVE-2024-47715 CVE-2024-50011 USN-7190-1 -- Tinyproxy vulnerability Ubuntu 24.04 LTS It was discovered that Tinyproxy did not properly manage memory during the parsing of HTTP connection headers. An attacker could use this issue to cause a DoS or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7190-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tinyproxy - 1.11.1-3ubuntu0.1 tinyproxy-bin - 1.11.1-3ubuntu0.1 No subscription required Medium CVE-2023-49606 USN-7192-1 -- xfpt vulnerability Ubuntu 24.04 LTS It was discovered that xfpt did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7192-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xfpt - 1.00-2ubuntu0.24.04.1 No subscription required Medium CVE-2024-43700 USN-7196-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Tracing file system; - Bitmap API; - BPF subsystem; - Memory Management; - Objagg library; - Perf events; - Virtio network driver; - VMware vSockets driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - KUnit for arithmetic overflow checks; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TIPC protocol; - Wireless networking; - AppArmor security module; - Landlock security; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - Amlogic Meson SoC drivers; - SoC audio core drivers; - USB sound devices; - Real-Time Linux Analysis tools; (CVE-2024-44979, CVE-2024-47658, CVE-2024-44970, CVE-2024-43913, CVE-2024-46816, CVE-2024-46738, CVE-2024-46777, CVE-2024-46730, CVE-2024-46811, CVE-2024-44954, CVE-2024-42317, CVE-2024-42279, CVE-2024-45002, CVE-2024-43826, CVE-2024-44967, CVE-2024-46721, CVE-2024-46763, CVE-2024-43856, CVE-2024-42284, CVE-2024-42289, CVE-2024-46806, CVE-2024-46776, CVE-2024-43843, CVE-2024-42298, CVE-2024-43832, CVE-2024-42321, CVE-2024-42292, CVE-2024-44982, CVE-2024-43842, CVE-2024-46772, CVE-2024-46702, CVE-2024-45017, CVE-2024-43888, CVE-2024-47683, CVE-2024-46714, CVE-2024-43899, CVE-2024-45025, CVE-2024-46751, CVE-2024-45020, CVE-2024-44977, CVE-2024-46853, CVE-2024-46753, CVE-2024-46792, CVE-2024-46675, CVE-2024-46805, CVE-2024-43890, CVE-2024-46703, CVE-2024-43841, CVE-2024-44960, CVE-2024-46846, CVE-2024-46798, CVE-2024-44965, CVE-2024-46812, CVE-2024-43835, CVE-2024-43839, CVE-2024-43886, CVE-2024-46843, CVE-2024-50264, CVE-2024-46706, CVE-2024-46851, CVE-2024-46758, CVE-2024-45027, CVE-2024-43887, CVE-2024-42278, CVE-2024-46701, CVE-2024-46708, CVE-2024-46817, CVE-2024-46871, CVE-2024-46771, CVE-2024-42304, CVE-2024-43877, CVE-2024-44996, CVE-2024-46741, CVE-2024-46842, CVE-2024-43902, CVE-2024-43818, CVE-2024-47662, CVE-2024-44931, CVE-2024-46793, CVE-2024-46746, CVE-2024-46782, CVE-2024-43914, CVE-2024-43824, CVE-2024-46767, CVE-2024-43871, CVE-2024-44971, CVE-2024-47666, CVE-2024-45008, CVE-2024-42263, CVE-2024-46815, CVE-2024-46824, CVE-2024-45015, CVE-2024-45000, CVE-2024-46841, CVE-2024-46770, CVE-2024-44942, CVE-2024-46679, CVE-2024-46724, CVE-2024-46759, CVE-2024-43845, CVE-2024-46795, CVE-2024-46818, CVE-2024-44988, CVE-2024-46807, CVE-2024-46787, CVE-2024-43894, CVE-2024-46803, CVE-2024-44947, CVE-2024-46786, CVE-2024-46689, CVE-2024-46686, CVE-2024-42290, CVE-2024-46868, CVE-2024-43857, CVE-2024-43909, CVE-2023-52889, CVE-2024-44944, CVE-2024-44973, CVE-2024-43905, CVE-2024-44938, CVE-2024-43864, CVE-2024-46850, CVE-2024-43867, CVE-2024-43819, CVE-2024-46691, CVE-2024-47664, CVE-2024-46821, CVE-2024-46867, CVE-2024-46716, CVE-2024-43881, CVE-2024-46788, CVE-2024-43912, CVE-2024-43904, CVE-2024-46727, CVE-2024-46680, CVE-2024-44985, CVE-2024-46813, CVE-2024-47668, CVE-2024-42277, CVE-2024-42291, CVE-2024-45003, CVE-2024-42309, CVE-2024-44937, CVE-2024-44953, CVE-2024-46718, CVE-2024-42276, CVE-2024-45028, CVE-2024-43863, CVE-2024-46866, CVE-2024-42258, CVE-2024-42273, CVE-2024-46717, CVE-2024-46797, CVE-2024-46854, CVE-2024-44972, CVE-2024-46791, CVE-2024-45010, CVE-2024-43825, CVE-2024-46775, CVE-2024-46745, CVE-2024-46808, CVE-2024-46831, CVE-2024-45018, CVE-2024-42319, CVE-2024-46822, CVE-2024-43883, CVE-2024-46722, CVE-2024-46694, CVE-2024-45009, CVE-2024-42320, CVE-2024-46825, CVE-2024-43821, CVE-2024-46749, CVE-2024-45006, CVE-2024-43895, CVE-2024-44950, CVE-2024-43827, CVE-2024-43876, CVE-2024-47659, CVE-2024-44989, CVE-2024-46804, CVE-2024-46754, CVE-2024-46766, CVE-2024-46728, CVE-2024-46828, CVE-2024-46826, CVE-2024-46810, CVE-2024-44963, CVE-2024-44934, CVE-2024-43829, CVE-2024-42268, CVE-2024-43850, CVE-2024-43853, CVE-2024-43854, CVE-2024-43892, CVE-2024-43859, CVE-2024-42285, CVE-2024-44962, CVE-2024-46725, CVE-2024-46814, CVE-2024-44935, CVE-2024-42264, CVE-2024-42260, CVE-2024-46858, CVE-2024-46778, CVE-2024-46774, CVE-2024-46848, CVE-2024-45013, CVE-2024-43837, CVE-2024-46683, CVE-2024-46757, CVE-2024-46726, CVE-2024-43831, CVE-2024-46737, CVE-2024-43893, CVE-2024-46823, CVE-2024-42302, CVE-2024-44990, CVE-2024-46755, CVE-2024-46707, CVE-2024-43833, CVE-2024-44940, CVE-2024-42259, CVE-2024-46855, CVE-2024-46827, CVE-2024-46809, CVE-2024-46836, CVE-2024-43907, CVE-2024-42312, CVE-2024-46692, CVE-2024-42297, CVE-2024-46864, CVE-2024-42299, CVE-2024-45011, CVE-2024-46838, CVE-2024-44993, CVE-2024-46802, CVE-2024-44966, CVE-2024-46739, CVE-2024-46780, CVE-2024-44961, CVE-2024-42316, CVE-2024-47660, CVE-2024-46859, CVE-2024-46762, CVE-2024-43861, CVE-2024-45012, CVE-2024-46784, CVE-2024-43908, CVE-2024-46832, CVE-2024-44969, CVE-2024-46750, CVE-2024-44958, CVE-2024-46740, CVE-2024-46829, CVE-2024-43873, CVE-2024-49984, CVE-2024-44983, CVE-2024-42288, CVE-2024-46735, CVE-2024-46676, CVE-2024-43823, CVE-2024-46779, CVE-2024-46744, CVE-2024-42310, CVE-2024-44980, CVE-2024-46870, CVE-2024-42307, CVE-2024-46768, CVE-2024-44984, CVE-2024-45007, CVE-2024-46710, CVE-2024-44978, CVE-2024-46723, CVE-2024-46845, CVE-2024-44999, CVE-2024-42311, CVE-2024-43884, CVE-2024-44939, CVE-2024-44974, CVE-2024-42314, CVE-2024-42318, CVE-2024-39472, CVE-2024-46693, CVE-2024-46794, CVE-2024-46844, CVE-2024-46695, CVE-2024-46720, CVE-2024-46860, CVE-2024-46835, CVE-2024-47665, CVE-2024-46715, CVE-2024-42305, CVE-2024-46773, CVE-2024-45030, CVE-2024-46697, CVE-2024-46705, CVE-2024-42286, CVE-2024-46834, CVE-2024-46681, CVE-2024-53057, CVE-2024-42303, CVE-2024-46678, CVE-2024-46756, CVE-2023-52918, CVE-2024-43860, CVE-2024-43911, CVE-2024-43880, CVE-2024-43910, CVE-2024-44975, CVE-2024-44959, CVE-2024-46747, CVE-2024-43846, CVE-2024-42274, CVE-2024-46672, CVE-2024-43852, CVE-2024-46709, CVE-2024-42306, CVE-2024-42281, CVE-2024-46849, CVE-2024-46719, CVE-2024-43830, CVE-2024-46685, CVE-2024-44998, CVE-2024-42313, CVE-2024-43820, CVE-2024-44991, CVE-2024-47674, CVE-2024-46785, CVE-2024-45021, CVE-2024-46677, CVE-2024-43870, CVE-2024-46698, CVE-2024-43900, CVE-2024-44956, CVE-2024-43849, CVE-2024-46687, CVE-2024-42296, CVE-2024-46830, CVE-2024-47669, CVE-2024-46732, CVE-2024-46733, CVE-2024-46852, CVE-2024-43906, CVE-2024-43847, CVE-2024-42294, CVE-2024-46731, CVE-2024-45029, CVE-2024-47667, CVE-2024-42272, CVE-2024-45022, CVE-2024-43879, CVE-2024-46765, CVE-2024-45026, CVE-2024-44986, CVE-2024-44995, CVE-2024-47663, CVE-2024-42262, CVE-2024-43889, CVE-2024-44987, CVE-2024-43866, CVE-2024-42265, CVE-2024-46847, CVE-2024-46673, CVE-2024-46783, CVE-2024-46761, CVE-2024-46840, CVE-2024-42301, CVE-2024-43868, CVE-2024-45005, CVE-2024-42322, CVE-2024-43828, CVE-2024-43834, CVE-2024-43891, CVE-2024-46861, CVE-2024-42261, CVE-2024-43875, CVE-2024-43840, CVE-2024-42287, CVE-2024-46752, CVE-2024-46711, CVE-2024-46713, CVE-2024-44943, CVE-2024-46743, CVE-2024-43869, CVE-2024-46781, CVE-2024-44946, CVE-2024-42283, CVE-2024-47661, CVE-2024-43817, CVE-2024-46819, CVE-2024-42267, CVE-2024-46729, CVE-2024-46857, CVE-2024-42295, CVE-2024-46760, CVE-2024-42315, CVE-2024-45019, CVE-2024-44948, CVE-2024-44941, CVE-2024-42269, CVE-2024-44957, CVE-2024-49967) Update Instructions: Run `sudo pro fix USN-7196-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1020.23 linux-azure-cloud-tools-6.8.0-1020 - 6.8.0-1020.23 linux-azure-fde - 6.8.0-1020.23 linux-azure-headers-6.8.0-1020 - 6.8.0-1020.23 linux-azure-tools-6.8.0-1020 - 6.8.0-1020.23 linux-buildinfo-6.8.0-1020-azure - 6.8.0-1020.23 linux-cloud-tools-6.8.0-1020-azure - 6.8.0-1020.23 linux-cloud-tools-azure - 6.8.0-1020.23 linux-headers-6.8.0-1020-azure - 6.8.0-1020.23 linux-headers-azure - 6.8.0-1020.23 linux-image-6.8.0-1020-azure - 6.8.0-1020.23 linux-image-6.8.0-1020-azure-fde - 6.8.0-1020.23 linux-image-azure - 6.8.0-1020.23 linux-image-azure-fde - 6.8.0-1020.23 linux-image-unsigned-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-extra-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-extra-azure - 6.8.0-1020.23 linux-modules-involflt-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-involflt-azure - 6.8.0-1020.23 linux-modules-iwlwifi-6.8.0-1020-azure - 6.8.0-1020.23 linux-modules-iwlwifi-azure - 6.8.0-1020.23 linux-tools-6.8.0-1020-azure - 6.8.0-1020.23 linux-tools-azure - 6.8.0-1020.23 No subscription required High CVE-2023-52889 CVE-2023-52918 CVE-2024-39472 CVE-2024-42258 CVE-2024-42259 CVE-2024-42260 CVE-2024-42261 CVE-2024-42262 CVE-2024-42263 CVE-2024-42264 CVE-2024-42265 CVE-2024-42267 CVE-2024-42268 CVE-2024-42269 CVE-2024-42272 CVE-2024-42273 CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42291 CVE-2024-42292 CVE-2024-42294 CVE-2024-42295 CVE-2024-42296 CVE-2024-42297 CVE-2024-42298 CVE-2024-42299 CVE-2024-42301 CVE-2024-42302 CVE-2024-42303 CVE-2024-42304 CVE-2024-42305 CVE-2024-42306 CVE-2024-42307 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315 CVE-2024-42316 CVE-2024-42317 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42321 CVE-2024-42322 CVE-2024-43817 CVE-2024-43818 CVE-2024-43819 CVE-2024-43820 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825 CVE-2024-43826 CVE-2024-43827 CVE-2024-43828 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43832 CVE-2024-43833 CVE-2024-43834 CVE-2024-43835 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841 CVE-2024-43842 CVE-2024-43843 CVE-2024-43845 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850 CVE-2024-43852 CVE-2024-43853 CVE-2024-43854 CVE-2024-43856 CVE-2024-43857 CVE-2024-43859 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864 CVE-2024-43866 CVE-2024-43867 CVE-2024-43868 CVE-2024-43869 CVE-2024-43870 CVE-2024-43871 CVE-2024-43873 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879 CVE-2024-43880 CVE-2024-43881 CVE-2024-43883 CVE-2024-43884 CVE-2024-43886 CVE-2024-43887 CVE-2024-43888 CVE-2024-43889 CVE-2024-43890 CVE-2024-43891 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43895 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902 CVE-2024-43904 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908 CVE-2024-43909 CVE-2024-43910 CVE-2024-43911 CVE-2024-43912 CVE-2024-43913 CVE-2024-43914 CVE-2024-44931 CVE-2024-44934 CVE-2024-44935 CVE-2024-44937 CVE-2024-44938 CVE-2024-44939 CVE-2024-44940 CVE-2024-44941 CVE-2024-44942 CVE-2024-44943 CVE-2024-44944 CVE-2024-44946 CVE-2024-44947 CVE-2024-44948 CVE-2024-44950 CVE-2024-44953 CVE-2024-44954 CVE-2024-44956 CVE-2024-44957 CVE-2024-44958 CVE-2024-44959 CVE-2024-44960 CVE-2024-44961 CVE-2024-44962 CVE-2024-44963 CVE-2024-44965 CVE-2024-44966 CVE-2024-44967 CVE-2024-44969 CVE-2024-44970 CVE-2024-44971 CVE-2024-44972 CVE-2024-44973 CVE-2024-44974 CVE-2024-44975 CVE-2024-44977 CVE-2024-44978 CVE-2024-44979 CVE-2024-44980 CVE-2024-44982 CVE-2024-44983 CVE-2024-44984 CVE-2024-44985 CVE-2024-44986 CVE-2024-44987 CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44991 CVE-2024-44993 CVE-2024-44995 CVE-2024-44996 CVE-2024-44998 CVE-2024-44999 CVE-2024-45000 CVE-2024-45002 CVE-2024-45003 CVE-2024-45005 CVE-2024-45006 CVE-2024-45007 CVE-2024-45008 CVE-2024-45009 CVE-2024-45010 CVE-2024-45011 CVE-2024-45012 CVE-2024-45013 CVE-2024-45015 CVE-2024-45017 CVE-2024-45018 CVE-2024-45019 CVE-2024-45020 CVE-2024-45021 CVE-2024-45022 CVE-2024-45025 CVE-2024-45026 CVE-2024-45027 CVE-2024-45028 CVE-2024-45029 CVE-2024-45030 CVE-2024-46672 CVE-2024-46673 CVE-2024-46675 CVE-2024-46676 CVE-2024-46677 CVE-2024-46678 CVE-2024-46679 CVE-2024-46680 CVE-2024-46681 CVE-2024-46683 CVE-2024-46685 CVE-2024-46686 CVE-2024-46687 CVE-2024-46689 CVE-2024-46691 CVE-2024-46692 CVE-2024-46693 CVE-2024-46694 CVE-2024-46695 CVE-2024-46697 CVE-2024-46698 CVE-2024-46701 CVE-2024-46702 CVE-2024-46703 CVE-2024-46705 CVE-2024-46706 CVE-2024-46707 CVE-2024-46708 CVE-2024-46709 CVE-2024-46710 CVE-2024-46711 CVE-2024-46713 CVE-2024-46714 CVE-2024-46715 CVE-2024-46716 CVE-2024-46717 CVE-2024-46718 CVE-2024-46719 CVE-2024-46720 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723 CVE-2024-46724 CVE-2024-46725 CVE-2024-46726 CVE-2024-46727 CVE-2024-46728 CVE-2024-46729 CVE-2024-46730 CVE-2024-46731 CVE-2024-46732 CVE-2024-46733 CVE-2024-46735 CVE-2024-46737 CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46741 CVE-2024-46743 CVE-2024-46744 CVE-2024-46745 CVE-2024-46746 CVE-2024-46747 CVE-2024-46749 CVE-2024-46750 CVE-2024-46751 CVE-2024-46752 CVE-2024-46753 CVE-2024-46754 CVE-2024-46755 CVE-2024-46759 CVE-2024-46760 CVE-2024-46761 CVE-2024-46762 CVE-2024-46763 CVE-2024-46765 CVE-2024-46766 CVE-2024-46767 CVE-2024-46768 CVE-2024-46770 CVE-2024-46771 CVE-2024-46772 CVE-2024-46773 CVE-2024-46774 CVE-2024-46775 CVE-2024-46776 CVE-2024-46777 CVE-2024-46778 CVE-2024-46779 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782 CVE-2024-46783 CVE-2024-46784 CVE-2024-46785 CVE-2024-46786 CVE-2024-46787 CVE-2024-46788 CVE-2024-46791 CVE-2024-46792 CVE-2024-46793 CVE-2024-46794 CVE-2024-46795 CVE-2024-46797 CVE-2024-46798 CVE-2024-46802 CVE-2024-46803 CVE-2024-46804 CVE-2024-46805 CVE-2024-46806 CVE-2024-46807 CVE-2024-46808 CVE-2024-46809 CVE-2024-46810 CVE-2024-46811 CVE-2024-46812 CVE-2024-46813 CVE-2024-46814 CVE-2024-46815 CVE-2024-46816 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822 CVE-2024-46823 CVE-2024-46824 CVE-2024-46825 CVE-2024-46826 CVE-2024-46827 CVE-2024-46828 CVE-2024-46829 CVE-2024-46830 CVE-2024-46831 CVE-2024-46832 CVE-2024-46834 CVE-2024-46835 CVE-2024-46836 CVE-2024-46838 CVE-2024-46840 CVE-2024-46841 CVE-2024-46842 CVE-2024-46843 CVE-2024-46844 CVE-2024-46845 CVE-2024-46846 CVE-2024-46847 CVE-2024-46848 CVE-2024-46849 CVE-2024-46850 CVE-2024-46851 CVE-2024-46852 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855 CVE-2024-46857 CVE-2024-46858 CVE-2024-46859 CVE-2024-46860 CVE-2024-46861 CVE-2024-46864 CVE-2024-46866 CVE-2024-46867 CVE-2024-46868 CVE-2024-46870 CVE-2024-46871 CVE-2024-47658 CVE-2024-47659 CVE-2024-47660 CVE-2024-47661 CVE-2024-47662 CVE-2024-47663 CVE-2024-47664 CVE-2024-47665 CVE-2024-47666 CVE-2024-47667 CVE-2024-47668 CVE-2024-47669 CVE-2024-47674 CVE-2024-47683 CVE-2024-49984 CVE-2024-50264 CVE-2024-53057 USN-7197-1 -- Go Networking vulnerability Ubuntu 24.04 LTS Guido Vranken discovered that Go Networking handled input to the Parse functions inefficiently. An attacker could possibly use this issue to cause denial of service. This update addresses the issue in the golang-golang-x-net and golang-golang-x-net-dev packages, as well as the library vendored within adsys and juju-core. Update Instructions: Run `sudo pro fix USN-7197-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: adsys - 0.14.3~24.04ubuntu0.1 adsys-windows - 0.14.3~24.04ubuntu0.1 No subscription required golang-golang-x-net-dev - 1:0.21.0+dfsg-1ubuntu0.1~esm1 No subscription required Medium CVE-2024-45338 USN-7199-1 -- xmltok library vulnerabilities Ubuntu 24.04 LTS It was discovered that Expat, contained within the xmltok library, incorrectly handled malformed XML data. If a user or application were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code. (CVE-2015-1283, CVE-2016-0718, CVE-2016-4472, CVE-2019-15903) It was discovered that Expat, contained within the xmltok library, incorrectly handled XML data containing a large number of colons, which could lead to excessive resource consumption. If a user or application were tricked into opening a crafted XML file, an attacker could possibly use this issue to cause a denial of service. (CVE-2018-20843) It was discovered that Expat, contained within the xmltok library, incorrectly handled certain input, which could lead to an integer overflow. If a user or application were tricked into opening a crafted XML file, an attacker could possibly use this issue to cause a denial of service. (CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827) Update Instructions: Run `sudo pro fix USN-7199-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm2 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2015-1283 CVE-2016-0718 CVE-2016-4472 CVE-2018-20843 CVE-2019-15903 CVE-2021-46143 CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 USN-7201-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7201-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.5-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.5-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.5-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.5-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.5-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.5-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.5-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.5-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-54479 CVE-2024-54502 CVE-2024-54505 CVE-2024-54508 USN-7204-1 -- NeoMutt vulnerabilities Ubuntu 24.04 LTS Jeriko One discovered that NeoMutt incorrectly handled certain IMAP and POP3 responses. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in a denial of service, or the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14349, CVE-2018-14350, CVE-2018-14351, CVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355, CVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359, CVE-2018-14362) Jeriko One discovered that NeoMutt incorrectly handled certain NNTP-related operations. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in denial of service, or the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14360, CVE-2018-14361, CVE-2018-14363) It was discovered that NeoMutt incorrectly processed additional data when communicating with mail servers. An attacker could possibly use this issue to access senstive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14954, CVE-2020-28896) It was discovered that Neomutt incorrectly handled the IMAP QRSync setting. An attacker could possibly use this issue to cause NeoMutt to crash, resulting in denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32055) Tavis Ormandy discovered that NeoMutt incorrectly parsed uuencoded text past the length of the string. An attacker could possibly use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1328) It was discovered that NeoMutt did not properly encrypt email headers. An attacker could possibly use this issue to receive emails that were not intended for them and access sensitive information. This vulnerability was only fixed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-49393, CVE-2024-49394) Update Instructions: Run `sudo pro fix USN-7204-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: neomutt - 20231103+dfsg1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2018-14349 CVE-2018-14350 CVE-2018-14351 CVE-2018-14352 CVE-2018-14353 CVE-2018-14354 CVE-2018-14355 CVE-2018-14356 CVE-2018-14357 CVE-2018-14358 CVE-2018-14359 CVE-2018-14360 CVE-2018-14361 CVE-2018-14362 CVE-2018-14363 CVE-2020-14954 CVE-2020-28896 CVE-2021-32055 CVE-2022-1328 CVE-2024-49393 CVE-2024-49394 USN-7205-1 -- Django vulnerability Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain IPv6 strings. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7205-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.5 python3-django - 3:4.2.11-1ubuntu1.5 No subscription required Medium CVE-2024-56374 USN-7206-1 -- rsync vulnerabilities Ubuntu 24.04 LTS Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync did not properly handle checksum lengths. An attacker could use this issue to execute arbitrary code. (CVE-2024-12084) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync compared checksums with uninitialized memory. An attacker could exploit this issue to leak sensitive information. (CVE-2024-12085) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync incorrectly handled file checksums. A malicious server could use this to expose arbitrary client files. (CVE-2024-12086) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync mishandled symlinks for some settings. An attacker could exploit this to write files outside the intended directory. (CVE-2024-12087) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync failed to verify symbolic link destinations for some settings. An attacker could exploit this for path traversal attacks. (CVE-2024-12088) Aleksei Gorban discovered a race condition in rsync's handling of symbolic links. An attacker could use this to access sensitive information or escalate privileges. (CVE-2024-12747) Update Instructions: Run `sudo pro fix USN-7206-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.2.7-1ubuntu1.1 No subscription required High CVE-2024-12084 CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747 USN-7206-2 -- rsync regression Ubuntu 24.04 LTS USN-7206-1 fixed vulnerabilities in rsync. The update introduced a regression in rsync. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync did not properly handle checksum lengths. An attacker could use this issue to execute arbitrary code. (CVE-2024-12084) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync compared checksums with uninitialized memory. An attacker could exploit this issue to leak sensitive information. (CVE-2024-12085) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync incorrectly handled file checksums. A malicious server could use this to expose arbitrary client files. (CVE-2024-12086) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync mishandled symlinks for some settings. An attacker could exploit this to write files outside the intended directory. (CVE-2024-12087) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync failed to verify symbolic link destinations for some settings. An attacker could exploit this for path traversal attacks. (CVE-2024-12088) Aleksei Gorban discovered a race condition in rsync's handling of symbolic links. An attacker could use this to access sensitive information or escalate privileges. (CVE-2024-12747) Update Instructions: Run `sudo pro fix USN-7206-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.2.7-1ubuntu1.2 No subscription required None https://launchpad.net/bugs/2095004 USN-7207-1 -- Git vulnerabilities Ubuntu 24.04 LTS It was discovered that Git incorrectly handled certain URLs when asking for credentials. An attacker could possibly use this issue to mislead the user into typing passwords for trusted sites that would then be sent to untrusted sites instead. (CVE-2024-50349) It was discovered that git incorrectly handled line endings when using credential helpers. (CVE-2024-52006) Update Instructions: Run `sudo pro fix USN-7207-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.2 git-all - 1:2.43.0-1ubuntu7.2 git-cvs - 1:2.43.0-1ubuntu7.2 git-daemon-run - 1:2.43.0-1ubuntu7.2 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.2 git-doc - 1:2.43.0-1ubuntu7.2 git-email - 1:2.43.0-1ubuntu7.2 git-gui - 1:2.43.0-1ubuntu7.2 git-man - 1:2.43.0-1ubuntu7.2 git-mediawiki - 1:2.43.0-1ubuntu7.2 git-svn - 1:2.43.0-1ubuntu7.2 gitk - 1:2.43.0-1ubuntu7.2 gitweb - 1:2.43.0-1ubuntu7.2 No subscription required Medium CVE-2024-50349 CVE-2024-52006 USN-7210-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle input provided to its Convert.TryToHexString method. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21171) It was discovered that .NET did not properly handle an integer overflow when processing certain specially crafted files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21172) Daniel Plaisted and Noah Gilson discovered that .NET insecurely handled temporary file usage which could result in malicious package dependency injection. An attacker could possibly use this issue to elevate privileges. (CVE-2025-21173) It was discovered that .NET did not properly perform input data validation when processing certain specially crafted files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-21176) Update Instructions: Run `sudo pro fix USN-7210-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.112-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.112-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.112-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.112-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.112-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.112-8.0.12-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.12-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.12-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.12-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.12-0ubuntu1~24.04.1 No subscription required Medium CVE-2025-21171 CVE-2025-21172 CVE-2025-21173 CVE-2025-21176 USN-7213-1 -- poppler vulnerability Ubuntu 24.04 LTS It was discovered that poppler incorrectly handled memory when opening certain PDF files. An attacker could possibly use this issue to cause denial of service or obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7213-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.2 libpoppler-cpp-dev - 24.02.0-1ubuntu9.2 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.2 libpoppler-dev - 24.02.0-1ubuntu9.2 libpoppler-glib-dev - 24.02.0-1ubuntu9.2 libpoppler-glib-doc - 24.02.0-1ubuntu9.2 libpoppler-glib8t64 - 24.02.0-1ubuntu9.2 libpoppler-private-dev - 24.02.0-1ubuntu9.2 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.2 libpoppler-qt5-dev - 24.02.0-1ubuntu9.2 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.2 libpoppler-qt6-dev - 24.02.0-1ubuntu9.2 libpoppler134 - 24.02.0-1ubuntu9.2 poppler-utils - 24.02.0-1ubuntu9.2 No subscription required Medium CVE-2024-56378 USN-7216-1 -- tqdm vulnerability Ubuntu 24.04 LTS It was discovered that tqdm did not properly sanitize non-boolean CLI Arguments. A local attacker could possibly use this issue to execute arbitrary code on the host. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-34062) Update Instructions: Run `sudo pro fix USN-7216-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-tqdm - 4.66.2-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-34062 USN-7219-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that Python incorrectly handled asyncio write buffers. A remote attacker could possibly use this issue to cause Python to consume memory, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7219-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.4 libpython3.12-dev - 3.12.3-1ubuntu0.4 libpython3.12-minimal - 3.12.3-1ubuntu0.4 libpython3.12-stdlib - 3.12.3-1ubuntu0.4 libpython3.12-testsuite - 3.12.3-1ubuntu0.4 libpython3.12t64 - 3.12.3-1ubuntu0.4 python3.12 - 3.12.3-1ubuntu0.4 python3.12-dev - 3.12.3-1ubuntu0.4 python3.12-doc - 3.12.3-1ubuntu0.4 python3.12-examples - 3.12.3-1ubuntu0.4 python3.12-full - 3.12.3-1ubuntu0.4 python3.12-minimal - 3.12.3-1ubuntu0.4 python3.12-nopie - 3.12.3-1ubuntu0.4 python3.12-venv - 3.12.3-1ubuntu0.4 No subscription required Medium CVE-2024-12254 USN-7220-1 -- Vim vulnerability Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when closing buffers with the visual mode active. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7220-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.6 vim-athena - 2:9.1.0016-1ubuntu7.6 vim-common - 2:9.1.0016-1ubuntu7.6 vim-doc - 2:9.1.0016-1ubuntu7.6 vim-gtk3 - 2:9.1.0016-1ubuntu7.6 vim-gui-common - 2:9.1.0016-1ubuntu7.6 vim-motif - 2:9.1.0016-1ubuntu7.6 vim-nox - 2:9.1.0016-1ubuntu7.6 vim-runtime - 2:9.1.0016-1ubuntu7.6 vim-tiny - 2:9.1.0016-1ubuntu7.6 xxd - 2:9.1.0016-1ubuntu7.6 No subscription required Medium CVE-2025-22134 USN-7221-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystem: - Bluetooth drivers; (CVE-2024-53238, CVE-2024-56757) Update Instructions: Run `sudo pro fix USN-7221-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1012-oem - 6.11.0-1012.12 linux-headers-6.11.0-1012-oem - 6.11.0-1012.12 linux-headers-oem-24.04b - 6.11.0-1012.12 linux-image-6.11.0-1012-oem - 6.11.0-1012.12 linux-image-oem-24.04b - 6.11.0-1012.12 linux-image-uc-6.11.0-1012-oem - 6.11.0-1012.12 linux-image-uc-oem-24.04b - 6.11.0-1012.12 linux-image-unsigned-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu6-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu6-oem-24.04b - 6.11.0-1012.12 linux-modules-ipu7-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-ipu7-oem-24.04b - 6.11.0-1012.12 linux-modules-iwlwifi-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1012.12 linux-modules-usbio-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-usbio-oem-24.04b - 6.11.0-1012.12 linux-modules-vision-6.11.0-1012-oem - 6.11.0-1012.12 linux-modules-vision-oem-24.04b - 6.11.0-1012.12 linux-oem-24.04b - 6.11.0-1012.12 linux-oem-6.11-headers-6.11.0-1012 - 6.11.0-1012.12 linux-oem-6.11-tools-6.11.0-1012 - 6.11.0-1012.12 linux-tools-6.11.0-1012-oem - 6.11.0-1012.12 linux-tools-oem-24.04b - 6.11.0-1012.12 No subscription required Medium CVE-2024-53238 CVE-2024-56757 USN-7223-1 -- OpenJPEG vulnerabilities Ubuntu 24.04 LTS Frank Zeng discovered that OpenJPEG incorrectly handled memory when using the decompression utility. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-56826, CVE-2024-56827) Update Instructions: Run `sudo pro fix USN-7223-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.3 libopenjp2-7-dev - 2.5.0-2ubuntu0.3 libopenjp2-tools - 2.5.0-2ubuntu0.3 libopenjpip-dec-server - 2.5.0-2ubuntu0.3 libopenjpip-server - 2.5.0-2ubuntu0.3 libopenjpip-viewer - 2.5.0-2ubuntu0.3 libopenjpip7 - 2.5.0-2ubuntu0.3 openjpeg-doc - 2.5.0-2ubuntu0.3 No subscription required Medium CVE-2024-56826 CVE-2024-56827 USN-7224-1 -- Cyrus IMAP Server vulnerabilities Ubuntu 24.04 LTS It was discovered that non-authentication-related HTTP requests could be interpreted in an authentication context by a Cyrus IMAP Server when multiple requests arrived over the same connection. An unauthenticated attacker could possibly use this issue to perform a privilege escalation attack. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-18928) Matthew Horsfall discovered that Cyrus IMAP Server utilized a poor string hashing algorithm that could be abused to control where data was being stored. An attacker could possibly use this issue to perform a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-33582) Damian Poddebniak discovered that Cyrus IMAP Server could interpret specially crafted commands to exploit a memory issue. An authenticated attacker could possibly use this issue to perform a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-34055) Update Instructions: Run `sudo pro fix USN-7224-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cyrus-admin - 3.8.2-1ubuntu0.1~esm1 cyrus-caldav - 3.8.2-1ubuntu0.1~esm1 cyrus-clients - 3.8.2-1ubuntu0.1~esm1 cyrus-common - 3.8.2-1ubuntu0.1~esm1 cyrus-dev - 3.8.2-1ubuntu0.1~esm1 cyrus-doc - 3.8.2-1ubuntu0.1~esm1 cyrus-imapd - 3.8.2-1ubuntu0.1~esm1 cyrus-murder - 3.8.2-1ubuntu0.1~esm1 cyrus-nntpd - 3.8.2-1ubuntu0.1~esm1 cyrus-pop3d - 3.8.2-1ubuntu0.1~esm1 cyrus-replication - 3.8.2-1ubuntu0.1~esm1 libcyrus-imap-perl - 3.8.2-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2019-18928 CVE-2021-33582 CVE-2024-34055 USN-7225-1 -- HTMLDOC vulnerabilities Ubuntu 24.04 LTS It was discovered that HTMLDOC incorrectly handled memory in the image_set_mask, git_read_lzw, write_header and write_node functions, which could lead to a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0137, CVE-2022-24191, CVE-2022-34033, CVE-2022-34035) It was discovered that HTMLDOC incorrectly handled memory in the gif_get_code function, which could lead to a segmentation fault. If a user or application were tricked into opening a crafted GIF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0534) It was discovered that HTMLDOC did not perform proper bounds checks on image dimensions when loading JPEG images, which could lead to a buffer overflow. If a user or application were tricked into opening a crafted JPEG image, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27114) It was discovered that HTMLDOC incorrectly handled memory in the pdf_write_names function, which could lead to a heap buffer overflow. If a user or application were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or leak sensitive information. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-28085) It was discovered that HTMLDOC could be made to write out of bounds when attempting to strip whitespace. An attacker could use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-45508) It was discovered that HTMLDOC incorrectly handled memory in the parse_pre function, which could lead to a heap buffer overflow. If a user or application were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-46478) Update Instructions: Run `sudo pro fix USN-7225-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: htmldoc - 1.9.17-1ubuntu0.1~esm1 htmldoc-common - 1.9.17-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-0137 CVE-2022-0534 CVE-2022-24191 CVE-2022-27114 CVE-2022-28085 CVE-2022-34033 CVE-2022-34035 CVE-2024-45508 CVE-2024-46478 USN-7227-1 -- PCL vulnerability Ubuntu 24.04 LTS It was discovered that PCL incorrectly handled certain malformed files. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly exploit this to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7227-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpcl-apps1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-common1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-dev - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-doc - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-features1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-filters1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-io1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-kdtree1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-keypoints1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-ml1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-octree1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-outofcore1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-people1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-recognition1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-registration1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-sample-consensus1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-search1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-segmentation1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-stereo1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-surface1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-tracking1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 libpcl-visualization1.14 - 1.14.0+dfsg-1ubuntu0.1~esm1 pcl-tools - 1.14.0+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-53432 USN-7228-1 -- LibreOffice vulnerabilities Ubuntu 24.04 LTS Thomas Rinsma discovered that LibreOffice incorrectly handled paths when processing embedded font files. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to create arbitrary files ending with ".ttf". (CVE-2024-12425) Thomas Rinsma discovered that LibreOffice incorrectly handled certain environment variables and INI file values. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to exfiltrate sensitive information. (CVE-2024-12426) Update Instructions: Run `sudo pro fix USN-7228-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.2 libjuh-java - 4:24.2.7-0ubuntu0.24.04.2 libjurt-java - 4:24.2.7-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.2 libreoffice - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.2 libridl-java - 4:24.2.7-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.2 libunoil-java - 4:24.2.7-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.2 python3-access2base - 4:24.2.7-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.2 python3-uno - 4:24.2.7-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.2 ure - 4:24.2.7-0ubuntu0.24.04.2 ure-java - 4:24.2.7-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-12425 CVE-2024-12426 USN-7229-1 -- ClamAV vulnerability Ubuntu 24.04 LTS It was discovered that ClamAV incorrectly handled decrypting OLE2 content. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7229-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.8+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.8+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.8+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.8+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.8+dfsg-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-20128 USN-7230-2 -- FRR vulnerabilities Ubuntu 24.04 LTS Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2024-44070) It was discovered that FRR re-validated all routes in certain instances when the internal socket's buffer size overflowed. A remote attacker could possibly use this issue to impact the performance of FRR, resulting in a denial of service. (CVE-2024-55553) Update Instructions: Run `sudo pro fix USN-7230-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.3 frr-doc - 8.4.4-1.1ubuntu6.3 frr-pythontools - 8.4.4-1.1ubuntu6.3 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.3 frr-snmp - 8.4.4-1.1ubuntu6.3 No subscription required Medium CVE-2024-44070 CVE-2024-55553 USN-7231-1 -- Tcpreplay vulnerabilities Ubuntu 24.04 LTS It was discovered that Tcpreplay incorrectly handled memory when using the tcprewrite utility. A remote attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-27783) It was discovered that Tcpreplay incorrectly validated external input. A remote attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-27784, CVE-2023-27785, CVE-2023-27786, CVE-2023-27787, CVE-2023-27788, CVE-2023-27789) It was discovered that Tcpreplay incorrectly handled memory when using the tcprewrite utility. An attacker could possibly use this issue to cause Tcpreplay to crash, resulting in a denial of service. (CVE-2023-4256, CVE-2023-43279) Update Instructions: Run `sudo pro fix USN-7231-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tcpreplay - 4.4.4-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-27783 CVE-2023-27784 CVE-2023-27785 CVE-2023-27786 CVE-2023-27787 CVE-2023-27788 CVE-2023-27789 CVE-2023-4256 CVE-2023-43279 USN-7236-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53164, CVE-2024-53103, CVE-2024-53141) Update Instructions: Run `sudo pro fix USN-7236-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-cloud-tools-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-cloud-tools-gkeop - 6.8.0-1004.6 linux-cloud-tools-gkeop-6.8 - 6.8.0-1004.6 linux-gkeop - 6.8.0-1004.6 linux-gkeop-6.8 - 6.8.0-1004.6 linux-gkeop-cloud-tools-6.8.0-1004 - 6.8.0-1004.6 linux-gkeop-headers-6.8.0-1004 - 6.8.0-1004.6 linux-gkeop-tools-6.8.0-1004 - 6.8.0-1004.6 linux-headers-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-headers-gkeop - 6.8.0-1004.6 linux-headers-gkeop-6.8 - 6.8.0-1004.6 linux-image-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-image-gkeop - 6.8.0-1004.6 linux-image-gkeop-6.8 - 6.8.0-1004.6 linux-image-unsigned-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-extra-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-modules-extra-gkeop - 6.8.0-1004.6 linux-modules-extra-gkeop-6.8 - 6.8.0-1004.6 linux-tools-6.8.0-1004-gkeop - 6.8.0-1004.6 linux-tools-gkeop - 6.8.0-1004.6 linux-tools-gkeop-6.8 - 6.8.0-1004.6 No subscription required linux-buildinfo-6.8.0-1017-gke - 6.8.0-1017.21 linux-gke - 6.8.0-1017.21 linux-gke-headers-6.8.0-1017 - 6.8.0-1017.21 linux-gke-tools-6.8.0-1017 - 6.8.0-1017.21 linux-headers-6.8.0-1017-gke - 6.8.0-1017.21 linux-headers-gke - 6.8.0-1017.21 linux-image-6.8.0-1017-gke - 6.8.0-1017.21 linux-image-gke - 6.8.0-1017.21 linux-image-unsigned-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-extra-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-iwlwifi-6.8.0-1017-gke - 6.8.0-1017.21 linux-modules-iwlwifi-gke - 6.8.0-1017.21 linux-tools-6.8.0-1017-gke - 6.8.0-1017.21 linux-tools-gke - 6.8.0-1017.21 No subscription required linux-buildinfo-6.8.0-1018-raspi - 6.8.0-1018.20 linux-headers-6.8.0-1018-raspi - 6.8.0-1018.20 linux-headers-raspi - 6.8.0-1018.20 linux-image-6.8.0-1018-raspi - 6.8.0-1018.20 linux-image-raspi - 6.8.0-1018.20 linux-modules-6.8.0-1018-raspi - 6.8.0-1018.20 linux-raspi - 6.8.0-1018.20 linux-raspi-headers-6.8.0-1018 - 6.8.0-1018.20 linux-raspi-tools-6.8.0-1018 - 6.8.0-1018.20 linux-tools-6.8.0-1018-raspi - 6.8.0-1018.20 linux-tools-raspi - 6.8.0-1018.20 No subscription required linux-buildinfo-6.8.0-1019-ibm - 6.8.0-1019.19 linux-headers-6.8.0-1019-ibm - 6.8.0-1019.19 linux-headers-ibm - 6.8.0-1019.19 linux-headers-ibm-classic - 6.8.0-1019.19 linux-headers-ibm-lts-24.04 - 6.8.0-1019.19 linux-ibm - 6.8.0-1019.19 linux-ibm-classic - 6.8.0-1019.19 linux-ibm-cloud-tools-common - 6.8.0-1019.19 linux-ibm-headers-6.8.0-1019 - 6.8.0-1019.19 linux-ibm-lts-24.04 - 6.8.0-1019.19 linux-ibm-source-6.8.0 - 6.8.0-1019.19 linux-ibm-tools-6.8.0-1019 - 6.8.0-1019.19 linux-image-6.8.0-1019-ibm - 6.8.0-1019.19 linux-image-ibm - 6.8.0-1019.19 linux-image-ibm-classic - 6.8.0-1019.19 linux-image-ibm-lts-24.04 - 6.8.0-1019.19 linux-image-unsigned-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-extra-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-6.8.0-1019-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-ibm - 6.8.0-1019.19 linux-modules-iwlwifi-ibm-classic - 6.8.0-1019.19 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1019.19 linux-tools-6.8.0-1019-ibm - 6.8.0-1019.19 linux-tools-ibm - 6.8.0-1019.19 linux-tools-ibm-classic - 6.8.0-1019.19 linux-tools-ibm-lts-24.04 - 6.8.0-1019.19 No subscription required linux-buildinfo-6.8.0-1019-oracle - 6.8.0-1019.20 linux-buildinfo-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-headers-6.8.0-1019-oracle - 6.8.0-1019.20 linux-headers-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-headers-oracle - 6.8.0-1019.20 linux-headers-oracle-64k - 6.8.0-1019.20 linux-image-6.8.0-1019-oracle - 6.8.0-1019.20 linux-image-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-image-oracle - 6.8.0-1019.20 linux-image-oracle-64k - 6.8.0-1019.20 linux-image-unsigned-6.8.0-1019-oracle - 6.8.0-1019.20 linux-image-unsigned-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-modules-6.8.0-1019-oracle - 6.8.0-1019.20 linux-modules-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-modules-extra-6.8.0-1019-oracle - 6.8.0-1019.20 linux-modules-extra-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-oracle - 6.8.0-1019.20 linux-oracle-64k - 6.8.0-1019.20 linux-oracle-headers-6.8.0-1019 - 6.8.0-1019.20 linux-oracle-tools-6.8.0-1019 - 6.8.0-1019.20 linux-tools-6.8.0-1019-oracle - 6.8.0-1019.20 linux-tools-6.8.0-1019-oracle-64k - 6.8.0-1019.20 linux-tools-oracle - 6.8.0-1019.20 linux-tools-oracle-64k - 6.8.0-1019.20 No subscription required linux-buildinfo-6.8.0-1021-gcp - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-buildinfo-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-cloud-tools-nvidia - 6.8.0-1021.23 linux-gcp - 6.8.0-1021.23 linux-gcp-headers-6.8.0-1021 - 6.8.0-1021.23 linux-gcp-tools-6.8.0-1021 - 6.8.0-1021.23 linux-headers-6.8.0-1021-gcp - 6.8.0-1021.23 linux-headers-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-headers-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-headers-gcp - 6.8.0-1021.23 linux-headers-nvidia - 6.8.0-1021.23 linux-headers-nvidia-64k - 6.8.0-1021.23 linux-image-6.8.0-1021-gcp - 6.8.0-1021.23 linux-image-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-image-gcp - 6.8.0-1021.23 linux-image-nvidia - 6.8.0-1021.23 linux-image-nvidia-64k - 6.8.0-1021.23 linux-image-uc-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-uc-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-gcp - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-image-unsigned-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-6.8.0-1021-gcp - 6.8.0-1021.23 linux-modules-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-gcp - 6.8.0-1021.23 linux-modules-extra-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-extra-gcp - 6.8.0-1021.23 linux-modules-nvidia-fs-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-modules-nvidia-fs-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-modules-nvidia-fs-nvidia - 6.8.0-1021.23 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1021.23 linux-nvidia - 6.8.0-1021.23 linux-nvidia-64k - 6.8.0-1021.23 linux-nvidia-headers-6.8.0-1021 - 6.8.0-1021.23 linux-nvidia-tools-6.8.0-1021 - 6.8.0-1021.23 linux-tools-6.8.0-1021-gcp - 6.8.0-1021.23 linux-tools-6.8.0-1021-nvidia - 6.8.0-1021.23 linux-tools-6.8.0-1021-nvidia-64k - 6.8.0-1021.23 linux-tools-gcp - 6.8.0-1021.23 linux-tools-nvidia - 6.8.0-1021.23 linux-tools-nvidia-64k - 6.8.0-1021.23 No subscription required linux-buildinfo-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-buildinfo-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-headers-nvidia-lowlatency - 6.8.0-1021.23.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-uc-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-uc-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-image-unsigned-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-image-unsigned-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-extra-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1021.23.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-nvidia-lowlatency - 6.8.0-1021.23.1 linux-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-nvidia-lowlatency-headers-6.8.0-1021 - 6.8.0-1021.23.1 linux-nvidia-lowlatency-tools-6.8.0-1021 - 6.8.0-1021.23.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1021.23.1 linux-tools-6.8.0-1021-nvidia-lowlatency - 6.8.0-1021.23.1 linux-tools-6.8.0-1021-nvidia-lowlatency-64k - 6.8.0-1021.23.1 linux-tools-nvidia-lowlatency - 6.8.0-1021.23.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1021.23.1 No subscription required linux-azure - 6.8.0-1021.25 linux-azure-cloud-tools-6.8.0-1021 - 6.8.0-1021.25 linux-azure-fde - 6.8.0-1021.25 linux-azure-headers-6.8.0-1021 - 6.8.0-1021.25 linux-azure-tools-6.8.0-1021 - 6.8.0-1021.25 linux-buildinfo-6.8.0-1021-azure - 6.8.0-1021.25 linux-cloud-tools-6.8.0-1021-azure - 6.8.0-1021.25 linux-cloud-tools-azure - 6.8.0-1021.25 linux-headers-6.8.0-1021-azure - 6.8.0-1021.25 linux-headers-azure - 6.8.0-1021.25 linux-image-6.8.0-1021-azure - 6.8.0-1021.25 linux-image-6.8.0-1021-azure-fde - 6.8.0-1021.25 linux-image-azure - 6.8.0-1021.25 linux-image-azure-fde - 6.8.0-1021.25 linux-image-unsigned-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-extra-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-extra-azure - 6.8.0-1021.25 linux-modules-involflt-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-involflt-azure - 6.8.0-1021.25 linux-modules-iwlwifi-6.8.0-1021-azure - 6.8.0-1021.25 linux-modules-iwlwifi-azure - 6.8.0-1021.25 linux-tools-6.8.0-1021-azure - 6.8.0-1021.25 linux-tools-azure - 6.8.0-1021.25 No subscription required linux-buildinfo-6.8.0-52-generic - 6.8.0-52.53 linux-buildinfo-6.8.0-52-generic-64k - 6.8.0-52.53 linux-cloud-tools-6.8.0-52 - 6.8.0-52.53 linux-cloud-tools-6.8.0-52-generic - 6.8.0-52.53 linux-cloud-tools-common - 6.8.0-52.53 linux-cloud-tools-generic - 6.8.0-52.53 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-52.53 linux-cloud-tools-virtual - 6.8.0-52.53 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-52.53 linux-crashdump - 6.8.0-52.53 linux-doc - 6.8.0-52.53 linux-generic - 6.8.0-52.53 linux-generic-64k - 6.8.0-52.53 linux-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-generic-hwe-24.04 - 6.8.0-52.53 linux-generic-lpae - 6.8.0-52.53 linux-headers-6.8.0-52 - 6.8.0-52.53 linux-headers-6.8.0-52-generic - 6.8.0-52.53 linux-headers-6.8.0-52-generic-64k - 6.8.0-52.53 linux-headers-generic - 6.8.0-52.53 linux-headers-generic-64k - 6.8.0-52.53 linux-headers-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-headers-generic-hwe-24.04 - 6.8.0-52.53 linux-headers-generic-lpae - 6.8.0-52.53 linux-headers-kvm - 6.8.0-52.53 linux-headers-laptop-23.10 - 6.8.0-52.53 linux-headers-oem-20.04 - 6.8.0-52.53 linux-headers-oem-20.04b - 6.8.0-52.53 linux-headers-oem-20.04c - 6.8.0-52.53 linux-headers-oem-20.04d - 6.8.0-52.53 linux-headers-oem-22.04 - 6.8.0-52.53 linux-headers-virtual - 6.8.0-52.53 linux-headers-virtual-hwe-24.04 - 6.8.0-52.53 linux-image-6.8.0-52-generic - 6.8.0-52.53 linux-image-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-extra-virtual - 6.8.0-52.53 linux-image-extra-virtual-hwe-24.04 - 6.8.0-52.53 linux-image-generic - 6.8.0-52.53 linux-image-generic-64k - 6.8.0-52.53 linux-image-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-image-generic-hwe-24.04 - 6.8.0-52.53 linux-image-generic-lpae - 6.8.0-52.53 linux-image-kvm - 6.8.0-52.53 linux-image-laptop-23.10 - 6.8.0-52.53 linux-image-oem-20.04 - 6.8.0-52.53 linux-image-oem-20.04b - 6.8.0-52.53 linux-image-oem-20.04c - 6.8.0-52.53 linux-image-oem-20.04d - 6.8.0-52.53 linux-image-oem-22.04 - 6.8.0-52.53 linux-image-uc-6.8.0-52-generic - 6.8.0-52.53 linux-image-uc-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-uc-generic - 6.8.0-52.53 linux-image-uc-generic-hwe-24.04 - 6.8.0-52.53 linux-image-unsigned-6.8.0-52-generic - 6.8.0-52.53 linux-image-unsigned-6.8.0-52-generic-64k - 6.8.0-52.53 linux-image-virtual - 6.8.0-52.53 linux-image-virtual-hwe-24.04 - 6.8.0-52.53 linux-kvm - 6.8.0-52.53 linux-laptop-23.10 - 6.8.0-52.53 linux-lib-rust-6.8.0-52-generic - 6.8.0-52.53 linux-libc-dev - 6.8.0-52.53 linux-modules-6.8.0-52-generic - 6.8.0-52.53 linux-modules-6.8.0-52-generic-64k - 6.8.0-52.53 linux-modules-extra-6.8.0-52-generic - 6.8.0-52.53 linux-modules-ipu6-6.8.0-52-generic - 6.8.0-52.53 linux-modules-ipu6-generic - 6.8.0-52.53 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-52.53 linux-modules-iwlwifi-6.8.0-52-generic - 6.8.0-52.53 linux-modules-iwlwifi-generic - 6.8.0-52.53 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-52.53 linux-modules-iwlwifi-oem-20.04 - 6.8.0-52.53 linux-modules-iwlwifi-oem-20.04d - 6.8.0-52.53 linux-modules-iwlwifi-oem-22.04 - 6.8.0-52.53 linux-modules-usbio-6.8.0-52-generic - 6.8.0-52.53 linux-modules-usbio-generic - 6.8.0-52.53 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-52.53 linux-oem-20.04 - 6.8.0-52.53 linux-oem-20.04b - 6.8.0-52.53 linux-oem-20.04c - 6.8.0-52.53 linux-oem-20.04d - 6.8.0-52.53 linux-oem-22.04 - 6.8.0-52.53 linux-source - 6.8.0-52.53 linux-source-6.8.0 - 6.8.0-52.53 linux-tools-6.8.0-52 - 6.8.0-52.53 linux-tools-6.8.0-52-generic - 6.8.0-52.53 linux-tools-6.8.0-52-generic-64k - 6.8.0-52.53 linux-tools-common - 6.8.0-52.53 linux-tools-generic - 6.8.0-52.53 linux-tools-generic-64k - 6.8.0-52.53 linux-tools-generic-64k-hwe-24.04 - 6.8.0-52.53 linux-tools-generic-hwe-24.04 - 6.8.0-52.53 linux-tools-generic-lpae - 6.8.0-52.53 linux-tools-host - 6.8.0-52.53 linux-tools-kvm - 6.8.0-52.53 linux-tools-laptop-23.10 - 6.8.0-52.53 linux-tools-oem-20.04 - 6.8.0-52.53 linux-tools-oem-20.04b - 6.8.0-52.53 linux-tools-oem-20.04c - 6.8.0-52.53 linux-tools-oem-20.04d - 6.8.0-52.53 linux-tools-oem-22.04 - 6.8.0-52.53 linux-tools-virtual - 6.8.0-52.53 linux-tools-virtual-hwe-24.04 - 6.8.0-52.53 linux-virtual - 6.8.0-52.53 linux-virtual-hwe-24.04 - 6.8.0-52.53 No subscription required linux-buildinfo-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-buildinfo-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-cloud-tools-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-cloud-tools-lowlatency - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-headers-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-headers-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-headers-lowlatency - 6.8.0-52.53.1 linux-headers-lowlatency-64k - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-headers-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-image-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-image-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-image-lowlatency - 6.8.0-52.53.1 linux-image-lowlatency-64k - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-image-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-image-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-image-unsigned-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-image-unsigned-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-lowlatency - 6.8.0-52.53.1 linux-lowlatency-64k - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-lowlatency-cloud-tools-6.8.0-52 - 6.8.0-52.53.1 linux-lowlatency-headers-6.8.0-52 - 6.8.0-52.53.1 linux-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-lowlatency-lib-rust-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-lowlatency-tools-6.8.0-52 - 6.8.0-52.53.1 linux-modules-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-modules-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-modules-iwlwifi-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-modules-iwlwifi-lowlatency - 6.8.0-52.53.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.8.0-52.53.1 linux-tools-6.8.0-52-lowlatency - 6.8.0-52.53.1 linux-tools-6.8.0-52-lowlatency-64k - 6.8.0-52.53.1 linux-tools-lowlatency - 6.8.0-52.53.1 linux-tools-lowlatency-64k - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-52.53.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-52.53.1 linux-tools-lowlatency-hwe-24.04 - 6.8.0-52.53.1 No subscription required High CVE-2024-53103 CVE-2024-53141 CVE-2024-53164 USN-7237-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-47715, CVE-2024-53103, CVE-2024-53164, CVE-2024-53141) Update Instructions: Run `sudo pro fix USN-7237-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-oem - 6.8.0-1020.20 linux-headers-6.8.0-1020-oem - 6.8.0-1020.20 linux-headers-oem-24.04 - 6.8.0-1020.20 linux-headers-oem-24.04a - 6.8.0-1020.20 linux-image-6.8.0-1020-oem - 6.8.0-1020.20 linux-image-oem-24.04 - 6.8.0-1020.20 linux-image-oem-24.04a - 6.8.0-1020.20 linux-image-uc-6.8.0-1020-oem - 6.8.0-1020.20 linux-image-uc-oem-24.04 - 6.8.0-1020.20 linux-image-uc-oem-24.04a - 6.8.0-1020.20 linux-image-unsigned-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-ipu6-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-ipu6-oem-24.04 - 6.8.0-1020.20 linux-modules-ipu6-oem-24.04a - 6.8.0-1020.20 linux-modules-iwlwifi-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1020.20 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1020.20 linux-modules-usbio-6.8.0-1020-oem - 6.8.0-1020.20 linux-modules-usbio-oem-24.04 - 6.8.0-1020.20 linux-modules-usbio-oem-24.04a - 6.8.0-1020.20 linux-oem-24.04 - 6.8.0-1020.20 linux-oem-24.04a - 6.8.0-1020.20 linux-oem-6.8-headers-6.8.0-1020 - 6.8.0-1020.20 linux-oem-6.8-tools-6.8.0-1020 - 6.8.0-1020.20 linux-tools-6.8.0-1020-oem - 6.8.0-1020.20 linux-tools-oem-24.04 - 6.8.0-1020.20 linux-tools-oem-24.04a - 6.8.0-1020.20 No subscription required High CVE-2024-47715 CVE-2024-53103 CVE-2024-53141 CVE-2024-53164 USN-7238-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2024-53103, CVE-2024-53164) Update Instructions: Run `sudo pro fix USN-7238-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1013-oem - 6.11.0-1013.13 linux-headers-6.11.0-1013-oem - 6.11.0-1013.13 linux-headers-oem-24.04b - 6.11.0-1013.13 linux-image-6.11.0-1013-oem - 6.11.0-1013.13 linux-image-oem-24.04b - 6.11.0-1013.13 linux-image-uc-6.11.0-1013-oem - 6.11.0-1013.13 linux-image-uc-oem-24.04b - 6.11.0-1013.13 linux-image-unsigned-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu6-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu6-oem-24.04b - 6.11.0-1013.13 linux-modules-ipu7-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-ipu7-oem-24.04b - 6.11.0-1013.13 linux-modules-iwlwifi-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1013.13 linux-modules-usbio-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-usbio-oem-24.04b - 6.11.0-1013.13 linux-modules-vision-6.11.0-1013-oem - 6.11.0-1013.13 linux-modules-vision-oem-24.04b - 6.11.0-1013.13 linux-oem-24.04b - 6.11.0-1013.13 linux-oem-6.11-headers-6.11.0-1013 - 6.11.0-1013.13 linux-oem-6.11-tools-6.11.0-1013 - 6.11.0-1013.13 linux-tools-6.11.0-1013-oem - 6.11.0-1013.13 linux-tools-oem-24.04b - 6.11.0-1013.13 No subscription required High CVE-2024-53103 CVE-2024-53164 USN-7240-1 -- libxml2 vulnerabilities Ubuntu 24.04 LTS It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could use this issue to cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-49043) It was discovered that the libxml2 xmllint tool incorrectly handled certain memory operations. If a user or automated system were tricked into running xmllint on a specially crafted xml file, a remote attacker could cause xmllint to crash, resulting in a denial of service. (CVE-2024-34459) Update Instructions: Run `sudo pro fix USN-7240-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.1 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.1 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.1 No subscription required Medium CVE-2022-49043 CVE-2024-34459 USN-7241-1 -- Bind vulnerabilities Ubuntu 24.04 LTS Toshifumi Sakaguchi discovered that Bind incorrectly handled many records in the additional section. A remote attacker could possibly use this issue to cause Bind to consume CPU resources, leading to a denial of service. (CVE-2024-11187) Jean-François Billaud discovered that the Bind DNS-over-HTTPS implementation incorrectly handled a heavy query load. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-12705) Update Instructions: Run `sudo pro fix USN-7241-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.30-0ubuntu0.24.04.2 bind9-dev - 1:9.18.30-0ubuntu0.24.04.2 bind9-dnsutils - 1:9.18.30-0ubuntu0.24.04.2 bind9-doc - 1:9.18.30-0ubuntu0.24.04.2 bind9-host - 1:9.18.30-0ubuntu0.24.04.2 bind9-libs - 1:9.18.30-0ubuntu0.24.04.2 bind9-utils - 1:9.18.30-0ubuntu0.24.04.2 bind9utils - 1:9.18.30-0ubuntu0.24.04.2 dnsutils - 1:9.18.30-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-11187 CVE-2024-12705 USN-7243-1 -- VLC vulnerability Ubuntu 24.04 LTS It was discovered that VLC incorrectly handled memory when reading an MMS stream. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7243-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvlc-bin - 3.0.20-3ubuntu0.1~esm1 libvlc-dev - 3.0.20-3ubuntu0.1~esm1 libvlc5 - 3.0.20-3ubuntu0.1~esm1 libvlccore-dev - 3.0.20-3ubuntu0.1~esm1 libvlccore9 - 3.0.20-3ubuntu0.1~esm1 vlc - 3.0.20-3ubuntu0.1~esm1 vlc-bin - 3.0.20-3ubuntu0.1~esm1 vlc-data - 3.0.20-3ubuntu0.1~esm1 vlc-l10n - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-access-extra - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-base - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-fluidsynth - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-jack - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-notify - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-qt - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-samba - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-skins2 - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-svg - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-video-output - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-video-splitter - 3.0.20-3ubuntu0.1~esm1 vlc-plugin-visualization - 3.0.20-3ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-46461 USN-7244-1 -- Jinja2 vulnerabilities Ubuntu 24.04 LTS It was discovered that Jinja2 incorrectly handled certain filenames when compiling template content. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56201) It was discovered that Jinja2 incorrectly handled string formatting calls. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56326) Update Instructions: Run `sudo pro fix USN-7244-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.2 python3-jinja2 - 3.1.2-1ubuntu1.2 No subscription required Medium CVE-2024-56201 CVE-2024-56326 USN-7245-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.41 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-41.html https://www.oracle.com/security-alerts/cpujan2025.html Update Instructions: Run `sudo pro fix USN-7245-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.41-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.41-0ubuntu0.24.04.1 mysql-client - 8.0.41-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-router - 8.0.41-0ubuntu0.24.04.1 mysql-server - 8.0.41-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.41-0ubuntu0.24.04.1 mysql-testsuite - 8.0.41-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.41-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-21490 CVE-2025-21491 CVE-2025-21497 CVE-2025-21500 CVE-2025-21501 CVE-2025-21503 CVE-2025-21505 CVE-2025-21518 CVE-2025-21519 CVE-2025-21522 CVE-2025-21523 CVE-2025-21529 CVE-2025-21540 CVE-2025-21546 CVE-2025-21555 CVE-2025-21559 USN-7252-1 -- OpenJDK 11 vulnerability Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 11 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7252-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.26+4-1ubuntu1~24.04 openjdk-11-doc - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jdk - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre-headless - 11.0.26+4-1ubuntu1~24.04 openjdk-11-jre-zero - 11.0.26+4-1ubuntu1~24.04 openjdk-11-source - 11.0.26+4-1ubuntu1~24.04 No subscription required Medium CVE-2025-21502 USN-7253-1 -- OpenJDK 17 vulnerability Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 17 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7253-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.14+7-1~24.04 openjdk-17-doc - 17.0.14+7-1~24.04 openjdk-17-jdk - 17.0.14+7-1~24.04 openjdk-17-jdk-headless - 17.0.14+7-1~24.04 openjdk-17-jre - 17.0.14+7-1~24.04 openjdk-17-jre-headless - 17.0.14+7-1~24.04 openjdk-17-jre-zero - 17.0.14+7-1~24.04 openjdk-17-source - 17.0.14+7-1~24.04 No subscription required Medium CVE-2025-21502 USN-7254-1 -- OpenJDK 21 vulnerability Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 21 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. Update Instructions: Run `sudo pro fix USN-7254-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.6+7-1~24.04.1 openjdk-21-doc - 21.0.6+7-1~24.04.1 openjdk-21-jdk - 21.0.6+7-1~24.04.1 openjdk-21-jdk-headless - 21.0.6+7-1~24.04.1 openjdk-21-jre - 21.0.6+7-1~24.04.1 openjdk-21-jre-headless - 21.0.6+7-1~24.04.1 openjdk-21-jre-zero - 21.0.6+7-1~24.04.1 openjdk-21-source - 21.0.6+7-1~24.04.1 openjdk-21-testsupport - 21.0.6+7-1~24.04.1 No subscription required Medium CVE-2025-21502 USN-7257-1 -- Kerberos vulnerability Ubuntu 24.04 LTS Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces support for the Message-Authenticator attribute in non-EAP authentication methods for communications between Kerberos and a RADIUS server. Update Instructions: Run `sudo pro fix USN-7257-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.3 krb5-doc - 1.20.1-6ubuntu2.3 krb5-gss-samples - 1.20.1-6ubuntu2.3 krb5-k5tls - 1.20.1-6ubuntu2.3 krb5-kdc - 1.20.1-6ubuntu2.3 krb5-kdc-ldap - 1.20.1-6ubuntu2.3 krb5-kpropd - 1.20.1-6ubuntu2.3 krb5-locales - 1.20.1-6ubuntu2.3 krb5-multidev - 1.20.1-6ubuntu2.3 krb5-otp - 1.20.1-6ubuntu2.3 krb5-pkinit - 1.20.1-6ubuntu2.3 krb5-user - 1.20.1-6ubuntu2.3 libgssapi-krb5-2 - 1.20.1-6ubuntu2.3 libgssrpc4t64 - 1.20.1-6ubuntu2.3 libk5crypto3 - 1.20.1-6ubuntu2.3 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.3 libkadm5srv-mit12 - 1.20.1-6ubuntu2.3 libkdb5-10t64 - 1.20.1-6ubuntu2.3 libkrad-dev - 1.20.1-6ubuntu2.3 libkrad0 - 1.20.1-6ubuntu2.3 libkrb5-3 - 1.20.1-6ubuntu2.3 libkrb5-dev - 1.20.1-6ubuntu2.3 libkrb5support0 - 1.20.1-6ubuntu2.3 No subscription required Medium CVE-2024-3596 USN-7258-1 -- CKEditor vulnerabilities Ubuntu 24.04 LTS Kevin Backhouse discovered that CKEditor did not properly sanitize HTML content. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24728) It was discovered that CKEditor did not properly handle the creation of editor instances in the Iframe Dialog and Media Embed packages. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28439) It was discovered that CKEditor did not properly handle parsing HTML content. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. (CVE-2024-24815, CVE-2024-24816) It was discovered that CKEditor did not properly sanitize version notifications. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-43411) Update Instructions: Run `sudo pro fix USN-7258-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ckeditor - 4.22.1+dfsg1-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-24728 CVE-2023-28439 CVE-2024-24815 CVE-2024-24816 CVE-2024-43411 USN-7259-1 -- GNU C Library vulnerability Ubuntu 24.04 LTS It was discovered that GNU C Library incorrectly handled memory when using the assert function. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7259-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.39-0ubuntu8.4 glibc-source - 2.39-0ubuntu8.4 libc-bin - 2.39-0ubuntu8.4 libc-dev-bin - 2.39-0ubuntu8.4 libc-devtools - 2.39-0ubuntu8.4 libc6 - 2.39-0ubuntu8.4 libc6-amd64 - 2.39-0ubuntu8.4 libc6-dev - 2.39-0ubuntu8.4 libc6-dev-amd64 - 2.39-0ubuntu8.4 libc6-dev-i386 - 2.39-0ubuntu8.4 libc6-dev-s390 - 2.39-0ubuntu8.4 libc6-dev-x32 - 2.39-0ubuntu8.4 libc6-i386 - 2.39-0ubuntu8.4 libc6-s390 - 2.39-0ubuntu8.4 libc6-x32 - 2.39-0ubuntu8.4 locales - 2.39-0ubuntu8.4 locales-all - 2.39-0ubuntu8.4 nscd - 2.39-0ubuntu8.4 No subscription required Medium CVE-2025-0395 USN-7260-1 -- OpenRefine vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenRefine did not properly handle opening tar files. If a user or application were tricked into opening a crafted tar file, an attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-37476) It was discovered that OpenRefine incorrectly handled file permissions and user authentication. An unauthenticated attacker could possibly use this issue to leak sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-41886, CVE-2023-41887) It was discovered that OpenRefine did not properly disallow database settings to be modified when queried. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-23833) It was discovered that OpenRefine did not properly sanitize the GET parameter for authorized commands, leading to a cross site scripting vulnerability. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47878) It was discovered that OpenRefine did not properly prevent cross-site request forgery when running the preview-expression command. If a user or application were tricked into opening a specially crafted webpage, an attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47879) It was discovered that OpenRefine did not properly handle HTTP headers. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47880) It was discovered that OpenRefine incorrectly handled database extensions. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-47881) It was discovered that OpenRefine did not properly escape HTML tags in exception messages, which could enable code injection. If a user or application were tricked into opening a malicious file, an attacker could use this issue to execute arbitrary code. (CVE-2024-47882) It was discovered that OpenRefine did not correctly handle paths when executing the load-language command. An attacker could possibly use this issue to leak sensitive information. (CVE-2024-49760) Update Instructions: Run `sudo pro fix USN-7260-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openrefine - 3.7.7-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-37476 CVE-2023-41886 CVE-2023-41887 CVE-2024-23833 CVE-2024-47878 CVE-2024-47879 CVE-2024-47880 CVE-2024-47881 CVE-2024-47882 CVE-2024-49760 USN-7261-2 -- Vim vulnerability Ubuntu 24.04 LTS USN-7261-1 fixed vulnerabilities in Vim. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Vim incorrectly handled certain internal calls when scrolling a window. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7261-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.7 vim-athena - 2:9.1.0016-1ubuntu7.7 vim-common - 2:9.1.0016-1ubuntu7.7 vim-doc - 2:9.1.0016-1ubuntu7.7 vim-gtk3 - 2:9.1.0016-1ubuntu7.7 vim-gui-common - 2:9.1.0016-1ubuntu7.7 vim-motif - 2:9.1.0016-1ubuntu7.7 vim-nox - 2:9.1.0016-1ubuntu7.7 vim-runtime - 2:9.1.0016-1ubuntu7.7 vim-tiny - 2:9.1.0016-1ubuntu7.7 xxd - 2:9.1.0016-1ubuntu7.7 No subscription required Medium CVE-2025-24014 USN-7267-2 -- libsndfile vulnerability Ubuntu 24.04 LTS USN-7267-1 fixed a vulnerability in libsndfile. This update provides the corresponding updates for Ubuntu 24.04 LTS and Ubuntu 24.10. Original advisory details: It was discovered that libsndfile incorrectly handled certain malformed OggVorbis files. An attacker could possibly use this issue to cause libsndfile to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7267-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsndfile1 - 1.2.2-1ubuntu5.24.04.1 libsndfile1-dev - 1.2.2-1ubuntu5.24.04.1 sndfile-programs - 1.2.2-1ubuntu5.24.04.1 No subscription required Low CVE-2024-50612 USN-7269-2 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS USN-7269-1 fixed vulnerabilities in Intel Microcode. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel® Processors did not properly implement Finite State Machines (FSMs) in Hardware Logic. A local privileged attacker could use this issue to cause a denial of service. (CVE-2024-31068) It was discovered that some Intel® Processors with Intel® SGX did not properly restrict access to the EDECCSSA user leaf function. A local authenticated attacker could use this issue to cause a denial of service. (CVE-2024-36293) Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the UEFI firmware for some Intel® processors did not properly restrict access. An authenticated local attacker could use this issue to cause a denial of service. (CVE-2024-39279) Update Instructions: Run `sudo pro fix USN-7269-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250211.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-31068 CVE-2024-36293 CVE-2024-39279 USN-7270-1 -- OpenSSH vulnerabilities Ubuntu 24.04 LTS It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465) It was discovered that OpenSSH incorrectly handled the transport-level ping facility. A remote attacker could possibly use this issue to cause OpenSSH clients and servers to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-26466) Update Instructions: Run `sudo pro fix USN-7270-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.8 openssh-server - 1:9.6p1-3ubuntu13.8 openssh-sftp-server - 1:9.6p1-3ubuntu13.8 openssh-tests - 1:9.6p1-3ubuntu13.8 ssh - 1:9.6p1-3ubuntu13.8 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.8 No subscription required Medium CVE-2025-26465 CVE-2025-26466 USN-7271-2 -- virtualenv vulnerability Ubuntu 24.04 LTS USN-7271-1 fixed a vulnerability in virtualenv. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that virtualenv incorrectly handled paths when activating virtual environments. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7271-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-virtualenv - 20.25.0+ds-2ubuntu0.1~esm1 virtualenv - 20.25.0+ds-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-53899 USN-7272-1 -- Symfony vulnerabilities Ubuntu 24.04 LTS Soner Sayakci discovered that Symfony incorrectly handled cookie storage in the web cache. An attacker could possibly use this issue to obtain sensitive information and access unauthorized resources. (CVE-2022-24894) Marco Squarcina discovered that Symfony incorrectly handled the storage of user session information. An attacker could possibly use this issue to perform a cross-site request forgery (CSRF) attack. (CVE-2022-24895) Pierre Rudloff discovered that Symfony incorrectly checked HTML input. An attacker could possibly use this issue to perform cross site scripting. (CVE-2023-46734) Vladimir Dusheyko discovered that Symfony incorrectly sanitized special input with a PHP directive in URL query strings. An attacker could possibly use this issue to expose sensitive information or cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50340) Oleg Andreyev, Antoine Makdessi, and Moritz Rauch discovered that Symfony incorrectly handled user authentication. An attacker could possibly use this issue to access unauthorized resources and expose sensitive information. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-50341, CVE-2024-51996) Linus Karlsson and Chris Smith discovered that Symfony returned internal host information during host resolution. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50342) It was discovered that Symfony incorrectly parsed user input through regular expressions. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-50343) Sam Mush discovered that Symfony incorrectly parsed URIs with special characters. An attacker could possibly use this issue to perform phishing attacks. (CVE-2024-50345) Update Instructions: Run `sudo pro fix USN-7272-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-symfony - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-all-my-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-sns-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amazon-sqs-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-amqp-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-asset - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-asset-mapper - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-bandwidth-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-beanstalkd-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-brevo-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-brevo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-browser-kit - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-cache - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-chatwork-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-click-send-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-clickatell-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-clock - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-config - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-console - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-contact-everyone-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-crowdin-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-css-selector - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-debug-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dependency-injection - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-discord-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-doctrine-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-doctrine-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dom-crawler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-dotenv - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-engagespot-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-error-handler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-esendex-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-event-dispatcher - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-expo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-expression-language - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-fake-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-fake-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-filesystem - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-finder - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-firebase-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-form - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-forty-six-elks-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-framework-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-free-mobile-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-gateway-api-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-gitter-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-go-ip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-google-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-google-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-html-sanitizer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-client - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-foundation - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-http-kernel - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-infobip-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-infobip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-intl - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-iqsms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-isendpro-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-kaz-info-teh-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ldap - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-light-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-line-notify-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-linked-in-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-lock - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-loco-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-lokalise-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mail-pace-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailchimp-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailer-send-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailgun-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailjet-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mailjet-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mastodon-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mattermost-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mercure-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-message-bird-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-message-media-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-microsoft-teams-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mime - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-mobyt-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-monolog-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-novu-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ntfy-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-octopush-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-oh-my-smtp-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-one-signal-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-options-resolver - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-orange-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ovh-cloud-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-pager-duty-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-password-hasher - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-phpunit-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-phrase-translation-provider - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-plivo-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-postmark-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-process - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-property-access - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-property-info - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-proxy-manager-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-psr-http-message-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-pushover-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-rate-limiter - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-redis-messenger - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-redlink-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-remote-event - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-ring-central-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-rocket-chat-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-routing - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-runtime - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-scaleway-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-scheduler - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-core - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-csrf - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-security-http - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-semaphore - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendberry-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendgrid-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendinblue-mailer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sendinblue-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-serializer - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-simple-textin-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sinch-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-slack-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms-biuras-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms-factor-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-sms77-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsapi-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsc-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-smsmode-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-spot-hit-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-stopwatch - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-string - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-telegram-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-telnyx-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-templating - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-termii-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-translation - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-turbo-sms-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twig-bridge - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twig-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twilio-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-twitter-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-uid - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-validator - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-var-dumper - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-var-exporter - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-vonage-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-web-link - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-web-profiler-bundle - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-webhook - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-workflow - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-yaml - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-yunpian-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-zendesk-notifier - 6.4.5+dfsg-3ubuntu3+esm1 php-symfony-zulip-notifier - 6.4.5+dfsg-3ubuntu3+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-24894 CVE-2022-24895 CVE-2023-46734 CVE-2024-50340 CVE-2024-50341 CVE-2024-50342 CVE-2024-50343 CVE-2024-50345 CVE-2024-51996 USN-7275-2 -- Libtasn1 vulnerability Ubuntu 24.04 LTS USN-7275-1 fixed vulnerabilities in Libtasn1. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Bing Shi discovered that Libtasn1 inefficiently handled certificates. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7275-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtasn1-6 - 4.19.0-3ubuntu0.24.04.1 libtasn1-6-dev - 4.19.0-3ubuntu0.24.04.1 libtasn1-bin - 4.19.0-3ubuntu0.24.04.1 libtasn1-doc - 4.19.0-3ubuntu0.24.04.1 No subscription required Medium CVE-2024-12133 USN-7278-1 -- OpenSSL vulnerabilities Ubuntu 24.04 LTS George Pantelakis and Alicja Kario discovered that OpenSSL had a timing side-channel when performing ECDSA signature computations. A remote attacker could possibly use this issue to recover private data. (CVE-2024-13176) It was discovered that OpenSSL incorrectly handled certain memory operations when using low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial. When being used in this uncommon fashion, a remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-9143) Update Instructions: Run `sudo pro fix USN-7278-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.5 libssl-doc - 3.0.13-0ubuntu3.5 libssl3t64 - 3.0.13-0ubuntu3.5 openssl - 3.0.13-0ubuntu3.5 No subscription required Low CVE-2024-13176 CVE-2024-9143 USN-7279-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7279-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.46.6-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.6-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.46.6-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.46.6-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.46.6-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.46.6-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.46.6-0ubuntu0.24.04.1 webkit2gtk-driver - 2.46.6-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-24143 CVE-2025-24150 CVE-2025-24158 CVE-2025-24162 USN-7280-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that Python incorrectly handled parsing domain names that included square brackets. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack. Update Instructions: Run `sudo pro fix USN-7280-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.5 libpython3.12-dev - 3.12.3-1ubuntu0.5 libpython3.12-minimal - 3.12.3-1ubuntu0.5 libpython3.12-stdlib - 3.12.3-1ubuntu0.5 libpython3.12-testsuite - 3.12.3-1ubuntu0.5 libpython3.12t64 - 3.12.3-1ubuntu0.5 python3.12 - 3.12.3-1ubuntu0.5 python3.12-dev - 3.12.3-1ubuntu0.5 python3.12-doc - 3.12.3-1ubuntu0.5 python3.12-examples - 3.12.3-1ubuntu0.5 python3.12-full - 3.12.3-1ubuntu0.5 python3.12-minimal - 3.12.3-1ubuntu0.5 python3.12-nopie - 3.12.3-1ubuntu0.5 python3.12-venv - 3.12.3-1ubuntu0.5 No subscription required Medium CVE-2025-0938 USN-7281-1 -- GnuTLS vulnerability Ubuntu 24.04 LTS Bing Shi discovered that GnuTLS incorrectly handled decoding certain DER-encoded certificates. A remote attacker could possibly use this issue to cause GnuTLS to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7281-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.3-1.1ubuntu3.3 gnutls-doc - 3.8.3-1.1ubuntu3.3 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.3 libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.3 libgnutls28-dev - 3.8.3-1.1ubuntu3.3 libgnutls30t64 - 3.8.3-1.1ubuntu3.3 No subscription required Medium CVE-2024-12243 USN-7284-1 -- Netty vulnerabilities Ubuntu 24.04 LTS Jonathan Leitschuh discovered that Netty did not correctly handle file permissions when writing temporary files. An attacker could possibly use this issue to leak sensitive information. (CVE-2022-24823) It was discovered that Netty did not correctly handle limiting the number of fields when decoding a HTTP request. An attacker could possibly use issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29025) Update Instructions: Run `sudo pro fix USN-7284-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnetty-java - 1:4.1.48-9ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-24823 CVE-2024-29025 USN-7285-2 -- nginx vulnerability Ubuntu 24.04 LTS USN-7285-1 fixed vulnerabilities in nginx. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nginx incorrectly handled when multiple server blocks are configured to share the same IP address and port. An attacker could use this issue to use session resumption to bypass client certificate authentication requirements on these servers. Update Instructions: Run `sudo pro fix USN-7285-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.3 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.3 libnginx-mod-http-perl - 1.24.0-2ubuntu7.3 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.3 libnginx-mod-mail - 1.24.0-2ubuntu7.3 libnginx-mod-stream - 1.24.0-2ubuntu7.3 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.3 nginx - 1.24.0-2ubuntu7.3 nginx-common - 1.24.0-2ubuntu7.3 nginx-core - 1.24.0-2ubuntu7.3 nginx-dev - 1.24.0-2ubuntu7.3 nginx-doc - 1.24.0-2ubuntu7.3 nginx-extras - 1.24.0-2ubuntu7.3 nginx-full - 1.24.0-2ubuntu7.3 nginx-light - 1.24.0-2ubuntu7.3 No subscription required Medium CVE-2025-23419 USN-7286-1 -- iniParser vulnerability Ubuntu 24.04 LTS It was discovered that iniParser incorrectly handled certain files. An attacker could possibly use this issue to cause iniParser to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7286-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiniparser-dev - 4.1-7ubuntu0.1 libiniparser-doc - 4.1-7ubuntu0.1 libiniparser1 - 4.1-7ubuntu0.1 No subscription required Medium CVE-2025-0633 USN-7287-1 -- libcap2 vulnerability Ubuntu 24.04 LTS Tianjia Zhang discovered the libcap2 PAM module pam_cap incorrectly handled parsing group names in the configuration file. This could result in certain users being granted capabilities, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7287-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcap-dev - 1:2.66-5ubuntu2.2 libcap2 - 1:2.66-5ubuntu2.2 libcap2-bin - 1:2.66-5ubuntu2.2 libpam-cap - 1:2.66-5ubuntu2.2 No subscription required Medium CVE-2025-1390 USN-7297-1 -- ProFTPD vulnerabilities Ubuntu 24.04 LTS Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that the transport protocol implementation in ProFTPD had weak integrity checks. An attacker could use this vulnerability to bypass security features like encryption and integrity checks. (CVE-2023-48795) Martin Mirchev discovered that ProFTPD did not properly validate user input over the network. An attacker could use this vulnerability to crash ProFTPD or execute arbitrary code. (CVE-2023-51713) Brian Ristuccia discovered that ProFTPD incorrectly inherited groups from the parent process. An attacker could use this vulnerability to elevate privileges. (CVE-2024-48651) Update Instructions: Run `sudo pro fix USN-7297-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: proftpd-core - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-dev - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-doc - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-crypto - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-geoip - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-ldap - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-mysql - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-odbc - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-pgsql - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-snmp - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-sqlite - 1.3.8.b+dfsg-1ubuntu0.1 proftpd-mod-wrap - 1.3.8.b+dfsg-1ubuntu0.1 No subscription required Medium CVE-2023-48795 CVE-2023-51713 CVE-2024-48651 USN-7299-1 -- X.Org X Server vulnerabilities Ubuntu 24.04 LTS Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain memory operations. An attacker could use these issues to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7299-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.12-1ubuntu1.2 xorg-server-source - 2:21.1.12-1ubuntu1.2 xserver-common - 2:21.1.12-1ubuntu1.2 xserver-xephyr - 2:21.1.12-1ubuntu1.2 xserver-xorg-core - 2:21.1.12-1ubuntu1.2 xserver-xorg-dev - 2:21.1.12-1ubuntu1.2 xserver-xorg-legacy - 2:21.1.12-1ubuntu1.2 xvfb - 2:21.1.12-1ubuntu1.2 No subscription required xwayland - 2:23.2.6-1ubuntu0.4 No subscription required Medium CVE-2025-26594 CVE-2025-26595 CVE-2025-26596 CVE-2025-26597 CVE-2025-26598 CVE-2025-26599 CVE-2025-26600 CVE-2025-26601 USN-7301-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47748, CVE-2024-49935, CVE-2024-49892, CVE-2024-49960, CVE-2024-49886, CVE-2024-47757, CVE-2024-47741, CVE-2024-49879, CVE-2024-49983, CVE-2024-47687, CVE-2024-49948, CVE-2024-49902, CVE-2024-49969, CVE-2024-49903, CVE-2024-47675, CVE-2024-47713, CVE-2024-47750, CVE-2024-49951, CVE-2024-49936, CVE-2024-49913, CVE-2024-47684, CVE-2024-49917, CVE-2024-47693, CVE-2024-49871, CVE-2024-47740, CVE-2024-49927, CVE-2024-47698, CVE-2024-49996, CVE-2024-47682, CVE-2024-49889, CVE-2024-49888, CVE-2024-47737, CVE-2024-49881, CVE-2023-52917, CVE-2024-47695, CVE-2024-50015, CVE-2024-49965, CVE-2024-50179, CVE-2024-47677, CVE-2024-50013, CVE-2024-49855, CVE-2024-47751, CVE-2024-49895, CVE-2024-49930, CVE-2024-49905, CVE-2024-47709, CVE-2024-49953, CVE-2024-49896, CVE-2024-47688, CVE-2024-47712, CVE-2024-49907, CVE-2024-49955, CVE-2024-49933, CVE-2024-49880, CVE-2024-49860, CVE-2024-50176, CVE-2024-47727, CVE-2024-47673, CVE-2024-49878, CVE-2024-49862, CVE-2024-49911, CVE-2024-47734, CVE-2024-49995, CVE-2024-49924, CVE-2024-49925, CVE-2024-47749, CVE-2024-49945, CVE-2024-49950, CVE-2024-49891, CVE-2024-49915, CVE-2024-50006, CVE-2024-49962, CVE-2024-49952, CVE-2024-49982, CVE-2024-49939, CVE-2024-49985, CVE-2024-49928, CVE-2024-47692, CVE-2024-49884, CVE-2024-47756, CVE-2024-49918, CVE-2024-49976, CVE-2024-47671, CVE-2024-49859, CVE-2024-47705, CVE-2024-49864, CVE-2024-47733, CVE-2024-49961, CVE-2024-49973, CVE-2024-49989, CVE-2024-47719, CVE-2024-47685, CVE-2024-49988, CVE-2024-49975, CVE-2024-47681, CVE-2024-49944, CVE-2024-47718, CVE-2024-47689, CVE-2024-50008, CVE-2024-49959, CVE-2024-49868, CVE-2024-47743, CVE-2024-49885, CVE-2024-47742, CVE-2024-49946, CVE-2024-49876, CVE-2024-49875, CVE-2024-49894, CVE-2024-49957, CVE-2024-49980, CVE-2024-49851, CVE-2024-47732, CVE-2024-47716, CVE-2024-49938, CVE-2024-50016, CVE-2024-47735, CVE-2024-47696, CVE-2024-47691, CVE-2024-49994, CVE-2024-49863, CVE-2024-50000, CVE-2024-49919, CVE-2024-49947, CVE-2024-50001, CVE-2024-47678, CVE-2024-49870, CVE-2024-53144, CVE-2024-49929, CVE-2024-47730, CVE-2024-47700, CVE-2024-49900, CVE-2024-47723, CVE-2024-49934, CVE-2024-49883, CVE-2024-49897, CVE-2024-49912, CVE-2024-49991, CVE-2024-47701, CVE-2024-49987, CVE-2024-47753, CVE-2024-49923, CVE-2024-47707, CVE-2024-49853, CVE-2024-47720, CVE-2024-49999, CVE-2024-49958, CVE-2024-49861, CVE-2024-49937, CVE-2024-49852, CVE-2024-47703, CVE-2024-47710, CVE-2024-49942, CVE-2024-49963, CVE-2024-47697, CVE-2024-50175, CVE-2024-47745, CVE-2024-49909, CVE-2024-49997, CVE-2024-49874, CVE-2024-47706, CVE-2024-49922, CVE-2024-47739, CVE-2024-49974, CVE-2024-47744, CVE-2024-47754, CVE-2024-49931, CVE-2024-47690, CVE-2024-49986, CVE-2024-47715, CVE-2024-50014, CVE-2024-49898, CVE-2024-47731, CVE-2024-47670, CVE-2024-49877, CVE-2024-50007, CVE-2024-47699, CVE-2024-49998, CVE-2024-41016, CVE-2024-49850, CVE-2024-47752, CVE-2024-49901, CVE-2024-47728, CVE-2024-49856, CVE-2024-49992, CVE-2024-49926, CVE-2024-49978, CVE-2024-47672, CVE-2024-49954, CVE-2024-47704, CVE-2024-47747, CVE-2024-47738, CVE-2024-49966, CVE-2024-47714, CVE-2024-47686, CVE-2024-47702, CVE-2024-49882, CVE-2024-49858, CVE-2024-50002, CVE-2024-49866, CVE-2024-49981, CVE-2024-50012, CVE-2024-50017, CVE-2024-49890, CVE-2024-49977, CVE-2024-49949, CVE-2024-50005, CVE-2024-47679, CVE-2024-49867) Update Instructions: Run `sudo pro fix USN-7301-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-bpf-dev - 6.8.0-54.56 linux-buildinfo-6.8.0-54-generic - 6.8.0-54.56 linux-buildinfo-6.8.0-54-generic-64k - 6.8.0-54.56 linux-cloud-tools-6.8.0-54 - 6.8.0-54.56 linux-cloud-tools-6.8.0-54-generic - 6.8.0-54.56 linux-cloud-tools-common - 6.8.0-54.56 linux-cloud-tools-generic - 6.8.0-54.56 linux-cloud-tools-virtual - 6.8.0-54.56 linux-crashdump - 6.8.0-54.56 linux-doc - 6.8.0-54.56 linux-generic - 6.8.0-54.56 linux-generic-64k - 6.8.0-54.56 linux-generic-lpae - 6.8.0-54.56 linux-headers-6.8.0-54 - 6.8.0-54.56 linux-headers-6.8.0-54-generic - 6.8.0-54.56 linux-headers-6.8.0-54-generic-64k - 6.8.0-54.56 linux-headers-generic - 6.8.0-54.56 linux-headers-generic-64k - 6.8.0-54.56 linux-headers-generic-lpae - 6.8.0-54.56 linux-headers-kvm - 6.8.0-54.56 linux-headers-laptop-23.10 - 6.8.0-54.56 linux-headers-oem-20.04 - 6.8.0-54.56 linux-headers-oem-20.04b - 6.8.0-54.56 linux-headers-oem-20.04c - 6.8.0-54.56 linux-headers-oem-20.04d - 6.8.0-54.56 linux-headers-oem-22.04 - 6.8.0-54.56 linux-headers-virtual - 6.8.0-54.56 linux-image-6.8.0-54-generic - 6.8.0-54.56 linux-image-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-extra-virtual - 6.8.0-54.56 linux-image-generic - 6.8.0-54.56 linux-image-generic-64k - 6.8.0-54.56 linux-image-generic-lpae - 6.8.0-54.56 linux-image-kvm - 6.8.0-54.56 linux-image-laptop-23.10 - 6.8.0-54.56 linux-image-oem-20.04 - 6.8.0-54.56 linux-image-oem-20.04b - 6.8.0-54.56 linux-image-oem-20.04c - 6.8.0-54.56 linux-image-oem-20.04d - 6.8.0-54.56 linux-image-oem-22.04 - 6.8.0-54.56 linux-image-uc-6.8.0-54-generic - 6.8.0-54.56 linux-image-uc-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-uc-generic - 6.8.0-54.56 linux-image-unsigned-6.8.0-54-generic - 6.8.0-54.56 linux-image-unsigned-6.8.0-54-generic-64k - 6.8.0-54.56 linux-image-virtual - 6.8.0-54.56 linux-kvm - 6.8.0-54.56 linux-laptop-23.10 - 6.8.0-54.56 linux-lib-rust-6.8.0-54-generic - 6.8.0-54.56 linux-libc-dev - 6.8.0-54.56 linux-modules-6.8.0-54-generic - 6.8.0-54.56 linux-modules-6.8.0-54-generic-64k - 6.8.0-54.56 linux-modules-extra-6.8.0-54-generic - 6.8.0-54.56 linux-modules-ipu6-6.8.0-54-generic - 6.8.0-54.56 linux-modules-ipu6-generic - 6.8.0-54.56 linux-modules-iwlwifi-6.8.0-54-generic - 6.8.0-54.56 linux-modules-iwlwifi-generic - 6.8.0-54.56 linux-modules-iwlwifi-oem-20.04 - 6.8.0-54.56 linux-modules-iwlwifi-oem-20.04d - 6.8.0-54.56 linux-modules-iwlwifi-oem-22.04 - 6.8.0-54.56 linux-modules-usbio-6.8.0-54-generic - 6.8.0-54.56 linux-modules-usbio-generic - 6.8.0-54.56 linux-oem-20.04 - 6.8.0-54.56 linux-oem-20.04b - 6.8.0-54.56 linux-oem-20.04c - 6.8.0-54.56 linux-oem-20.04d - 6.8.0-54.56 linux-oem-22.04 - 6.8.0-54.56 linux-source - 6.8.0-54.56 linux-source-6.8.0 - 6.8.0-54.56 linux-tools-6.8.0-54 - 6.8.0-54.56 linux-tools-6.8.0-54-generic - 6.8.0-54.56 linux-tools-6.8.0-54-generic-64k - 6.8.0-54.56 linux-tools-common - 6.8.0-54.56 linux-tools-generic - 6.8.0-54.56 linux-tools-generic-64k - 6.8.0-54.56 linux-tools-generic-lpae - 6.8.0-54.56 linux-tools-host - 6.8.0-54.56 linux-tools-kvm - 6.8.0-54.56 linux-tools-laptop-23.10 - 6.8.0-54.56 linux-tools-oem-20.04 - 6.8.0-54.56 linux-tools-oem-20.04b - 6.8.0-54.56 linux-tools-oem-20.04c - 6.8.0-54.56 linux-tools-oem-20.04d - 6.8.0-54.56 linux-tools-oem-22.04 - 6.8.0-54.56 linux-tools-virtual - 6.8.0-54.56 linux-virtual - 6.8.0-54.56 No subscription required linux-buildinfo-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-buildinfo-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-cloud-tools-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-cloud-tools-lowlatency - 6.8.0-54.56.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-headers-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-headers-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-headers-lowlatency - 6.8.0-54.56.1 linux-headers-lowlatency-64k - 6.8.0-54.56.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-image-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-image-lowlatency - 6.8.0-54.56.1 linux-image-lowlatency-64k - 6.8.0-54.56.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-image-unsigned-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-image-unsigned-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-lowlatency - 6.8.0-54.56.1 linux-lowlatency-64k - 6.8.0-54.56.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-lowlatency-cloud-tools-6.8.0-54 - 6.8.0-54.56.1 linux-lowlatency-headers-6.8.0-54 - 6.8.0-54.56.1 linux-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 linux-lowlatency-lib-rust-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-lowlatency-tools-6.8.0-54 - 6.8.0-54.56.1 linux-modules-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-modules-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-modules-iwlwifi-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-modules-iwlwifi-lowlatency - 6.8.0-54.56.1 linux-tools-6.8.0-54-lowlatency - 6.8.0-54.56.1 linux-tools-6.8.0-54-lowlatency-64k - 6.8.0-54.56.1 linux-tools-lowlatency - 6.8.0-54.56.1 linux-tools-lowlatency-64k - 6.8.0-54.56.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-54.56.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-54.56.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-54.56.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-54.56.1 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-53144 CVE-2025-0927 USN-7302-1 -- libxml2 vulnerabilities Ubuntu 24.04 LTS It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could use this issue to cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2022-49043) It was discovered that the libxml2 xmllint tool incorrectly handled certain memory operations. If a user or automated system were tricked into running xmllint on a specially crafted xml file, a remote attacker could cause xmllint to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2024-34459) It was discovered that libxml2 did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-56171) It was discovered that libxml2 could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-24928) It was discovered that libxml2 could be made to dereference invalid memory. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-27113) Update Instructions: Run `sudo pro fix USN-7302-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.2 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.2 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.2 No subscription required Medium CVE-2022-49043 CVE-2024-34459 CVE-2024-56171 CVE-2025-24928 CVE-2025-27113 USN-7303-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-49852, CVE-2024-50175, CVE-2024-47709, CVE-2024-47671, CVE-2024-50179, CVE-2024-47743, CVE-2024-47687, CVE-2024-49934, CVE-2024-47700, CVE-2024-49892, CVE-2024-49866, CVE-2024-50012, CVE-2024-49860, CVE-2024-49948, CVE-2024-49882, CVE-2024-47744, CVE-2024-49905, CVE-2024-47728, CVE-2024-49874, CVE-2024-47678, CVE-2024-47688, CVE-2024-47737, CVE-2024-49859, CVE-2024-49947, CVE-2024-49994, CVE-2024-49986, CVE-2024-49917, CVE-2024-50000, CVE-2024-49962, CVE-2024-47733, CVE-2024-47741, CVE-2024-47685, CVE-2024-47752, CVE-2024-49960, CVE-2024-47754, CVE-2024-47675, CVE-2024-49958, CVE-2024-47748, CVE-2024-47679, CVE-2024-47690, CVE-2024-47740, CVE-2024-47672, CVE-2024-49883, CVE-2024-49928, CVE-2024-49961, CVE-2024-47677, CVE-2024-47706, CVE-2024-49955, CVE-2024-49907, CVE-2024-47745, CVE-2024-49963, CVE-2024-47723, CVE-2024-49897, CVE-2024-49927, CVE-2024-50008, CVE-2024-47713, CVE-2024-49894, CVE-2024-49903, CVE-2024-47747, CVE-2024-47705, CVE-2024-49976, CVE-2024-53144, CVE-2024-49983, CVE-2024-49937, CVE-2024-49953, CVE-2024-41016, CVE-2024-49969, CVE-2024-49982, CVE-2024-50007, CVE-2024-50015, CVE-2024-49889, CVE-2024-49923, CVE-2024-49850, CVE-2024-47720, CVE-2024-49973, CVE-2024-49991, CVE-2024-49901, CVE-2024-49881, CVE-2024-49911, CVE-2024-47710, CVE-2024-49981, CVE-2024-49918, CVE-2024-49861, CVE-2024-49959, CVE-2024-50005, CVE-2024-47701, CVE-2024-49855, CVE-2024-49987, CVE-2024-47704, CVE-2024-49977, CVE-2024-47670, CVE-2024-47707, CVE-2024-47735, CVE-2024-49996, CVE-2024-49868, CVE-2024-47749, CVE-2024-49985, CVE-2024-47753, CVE-2024-49877, CVE-2024-47716, CVE-2024-47731, CVE-2024-49880, CVE-2024-47715, CVE-2024-49931, CVE-2024-49856, CVE-2024-49929, CVE-2024-47689, CVE-2024-49885, CVE-2024-50002, CVE-2024-49999, CVE-2024-47734, CVE-2024-49909, CVE-2024-49871, CVE-2024-49915, CVE-2024-50013, CVE-2024-47682, CVE-2024-49864, CVE-2024-49949, CVE-2024-49933, CVE-2024-49975, CVE-2024-49863, CVE-2024-49867, CVE-2024-49951, CVE-2024-50014, CVE-2024-47739, CVE-2024-49886, CVE-2024-49891, CVE-2024-49879, CVE-2024-47696, CVE-2024-49896, CVE-2024-49988, CVE-2024-47691, CVE-2024-47732, CVE-2024-47742, CVE-2024-47698, CVE-2024-49925, CVE-2024-47695, CVE-2024-49898, CVE-2024-49989, CVE-2024-49913, CVE-2024-49935, CVE-2024-50017, CVE-2024-47703, CVE-2024-49954, CVE-2024-49875, CVE-2024-49858, CVE-2024-49997, CVE-2024-49895, CVE-2024-47719, CVE-2024-47750, CVE-2024-47693, CVE-2024-49926, CVE-2024-50001, CVE-2024-47718, CVE-2024-47714, CVE-2024-49919, CVE-2024-49938, CVE-2024-49952, CVE-2024-49942, CVE-2024-49957, CVE-2024-49930, CVE-2024-47702, CVE-2024-50006, CVE-2024-49888, CVE-2024-47756, CVE-2024-49890, CVE-2024-50176, CVE-2024-47686, CVE-2024-49978, CVE-2024-47697, CVE-2024-49974, CVE-2024-47751, CVE-2024-47712, CVE-2024-47727, CVE-2023-52917, CVE-2024-49980, CVE-2024-49965, CVE-2024-49878, CVE-2024-50016, CVE-2024-47738, CVE-2024-47681, CVE-2024-47699, CVE-2024-49998, CVE-2024-49902, CVE-2024-49966, CVE-2024-49884, CVE-2024-49936, CVE-2024-47757, CVE-2024-49851, CVE-2024-49924, CVE-2024-49944, CVE-2024-49912, CVE-2024-49992, CVE-2024-47684, CVE-2024-49950, CVE-2024-49939, CVE-2024-47730, CVE-2024-49853, CVE-2024-49862, CVE-2024-49900, CVE-2024-49876, CVE-2024-49945, CVE-2024-47673, CVE-2024-49870, CVE-2024-47692, CVE-2024-49946, CVE-2024-49995, CVE-2024-49922) Update Instructions: Run `sudo pro fix USN-7303-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-buildinfo-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-cloud-tools-nvidia - 6.8.0-1022.25 linux-headers-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-headers-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-headers-nvidia - 6.8.0-1022.25 linux-headers-nvidia-64k - 6.8.0-1022.25 linux-image-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-image-nvidia - 6.8.0-1022.25 linux-image-nvidia-64k - 6.8.0-1022.25 linux-image-uc-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-uc-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-image-unsigned-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-image-unsigned-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-extra-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-modules-nvidia-fs-nvidia - 6.8.0-1022.25 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1022.25 linux-nvidia - 6.8.0-1022.25 linux-nvidia-64k - 6.8.0-1022.25 linux-nvidia-headers-6.8.0-1022 - 6.8.0-1022.25 linux-nvidia-tools-6.8.0-1022 - 6.8.0-1022.25 linux-tools-6.8.0-1022-nvidia - 6.8.0-1022.25 linux-tools-6.8.0-1022-nvidia-64k - 6.8.0-1022.25 linux-tools-nvidia - 6.8.0-1022.25 linux-tools-nvidia-64k - 6.8.0-1022.25 No subscription required linux-buildinfo-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-headers-nvidia-lowlatency - 6.8.0-1022.25.2 linux-headers-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-uc-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-uc-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-image-unsigned-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-extra-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1022.25.2 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-nvidia-lowlatency - 6.8.0-1022.25.2 linux-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-nvidia-lowlatency-headers-6.8.0-1022 - 6.8.0-1022.25.2 linux-nvidia-lowlatency-tools-6.8.0-1022 - 6.8.0-1022.25.2 linux-tools-6.8.0-1022-nvidia-lowlatency - 6.8.0-1022.25.2 linux-tools-6.8.0-1022-nvidia-lowlatency-64k - 6.8.0-1022.25.2 linux-tools-nvidia-lowlatency - 6.8.0-1022.25.2 linux-tools-nvidia-lowlatency-64k - 6.8.0-1022.25.2 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-53144 USN-7303-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47718, CVE-2024-49942, CVE-2024-49897, CVE-2024-49871, CVE-2024-47687, CVE-2024-47692, CVE-2024-47740, CVE-2024-47691, CVE-2024-49973, CVE-2024-49958, CVE-2024-49889, CVE-2024-49927, CVE-2024-49883, CVE-2024-49885, CVE-2024-49912, CVE-2024-47686, CVE-2024-49985, CVE-2024-47732, CVE-2024-47685, CVE-2024-49935, CVE-2024-49995, CVE-2024-47731, CVE-2024-49931, CVE-2024-49886, CVE-2024-53144, CVE-2024-49917, CVE-2024-49868, CVE-2024-49999, CVE-2024-47684, CVE-2024-50013, CVE-2024-49962, CVE-2024-49981, CVE-2024-49858, CVE-2024-49878, CVE-2024-49852, CVE-2024-49928, CVE-2024-50006, CVE-2024-49988, CVE-2024-47697, CVE-2024-49923, CVE-2024-47704, CVE-2024-49947, CVE-2024-47751, CVE-2024-47672, CVE-2024-47737, CVE-2024-49909, CVE-2024-49992, CVE-2024-49944, CVE-2024-49950, CVE-2024-49850, CVE-2024-49951, CVE-2024-49996, CVE-2024-49934, CVE-2024-47705, CVE-2024-47741, CVE-2024-49957, CVE-2024-47682, CVE-2024-49976, CVE-2024-49895, CVE-2024-47689, CVE-2024-49937, CVE-2024-47702, CVE-2024-49959, CVE-2024-47719, CVE-2024-49922, CVE-2024-47743, CVE-2024-47696, CVE-2024-50017, CVE-2024-49864, CVE-2024-47747, CVE-2024-47748, CVE-2024-47701, CVE-2024-49915, CVE-2024-49877, CVE-2024-41016, CVE-2024-49961, CVE-2024-47730, CVE-2024-49924, CVE-2024-49974, CVE-2024-49875, CVE-2024-49918, CVE-2024-47712, CVE-2024-50014, CVE-2024-47679, CVE-2024-49894, CVE-2024-49911, CVE-2024-49855, CVE-2024-49948, CVE-2024-49955, CVE-2023-52917, CVE-2024-50015, CVE-2024-47754, CVE-2024-49929, CVE-2024-50005, CVE-2024-47742, CVE-2024-49991, CVE-2024-49913, CVE-2024-49980, CVE-2024-47749, CVE-2024-49975, CVE-2024-47671, CVE-2024-47677, CVE-2024-47727, CVE-2024-47716, CVE-2024-47707, CVE-2024-49870, CVE-2024-47703, CVE-2024-47710, CVE-2024-49977, CVE-2024-49997, CVE-2024-49853, CVE-2024-47681, CVE-2024-49986, CVE-2024-49969, CVE-2024-50000, CVE-2024-47690, CVE-2024-47709, CVE-2024-47713, CVE-2024-47720, CVE-2024-49879, CVE-2024-47699, CVE-2024-47714, CVE-2024-50012, CVE-2024-49880, CVE-2024-49946, CVE-2024-47735, CVE-2024-49876, CVE-2024-49963, CVE-2024-50176, CVE-2024-49952, CVE-2024-49881, CVE-2024-49987, CVE-2024-49919, CVE-2024-49860, CVE-2024-47744, CVE-2024-47723, CVE-2024-50001, CVE-2024-47756, CVE-2024-49867, CVE-2024-47728, CVE-2024-49933, CVE-2024-47752, CVE-2024-49998, CVE-2024-50179, CVE-2024-47706, CVE-2024-49989, CVE-2024-47670, CVE-2024-49965, CVE-2024-47673, CVE-2024-47700, CVE-2024-47688, CVE-2024-49953, CVE-2024-50016, CVE-2024-49907, CVE-2024-49930, CVE-2024-50002, CVE-2024-49859, CVE-2024-49939, CVE-2024-47675, CVE-2024-49861, CVE-2024-50175, CVE-2024-47757, CVE-2024-49900, CVE-2024-49954, CVE-2024-49982, CVE-2024-49891, CVE-2024-47678, CVE-2024-49936, CVE-2024-49901, CVE-2024-49898, CVE-2024-47693, CVE-2024-50007, CVE-2024-49896, CVE-2024-49863, CVE-2024-47750, CVE-2024-49949, CVE-2024-49888, CVE-2024-47739, CVE-2024-49983, CVE-2024-47695, CVE-2024-47738, CVE-2024-47734, CVE-2024-49892, CVE-2024-47698, CVE-2024-49902, CVE-2024-47715, CVE-2024-49926, CVE-2024-49882, CVE-2024-49978, CVE-2024-49945, CVE-2024-49925, CVE-2024-47733, CVE-2024-49874, CVE-2024-49856, CVE-2024-49966, CVE-2024-49960, CVE-2024-49905, CVE-2024-49866, CVE-2024-49903, CVE-2024-49862, CVE-2024-50008, CVE-2024-49994, CVE-2024-49851, CVE-2024-47745, CVE-2024-49884, CVE-2024-47753, CVE-2024-49938, CVE-2024-49890) Update Instructions: Run `sudo pro fix USN-7303-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-oracle - 6.8.0-1020.21 linux-buildinfo-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-headers-6.8.0-1020-oracle - 6.8.0-1020.21 linux-headers-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-headers-oracle - 6.8.0-1020.21 linux-headers-oracle-64k - 6.8.0-1020.21 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-headers-oracle-lts-24.04 - 6.8.0-1020.21 linux-image-6.8.0-1020-oracle - 6.8.0-1020.21 linux-image-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-image-oracle - 6.8.0-1020.21 linux-image-oracle-64k - 6.8.0-1020.21 linux-image-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-image-oracle-lts-24.04 - 6.8.0-1020.21 linux-image-unsigned-6.8.0-1020-oracle - 6.8.0-1020.21 linux-image-unsigned-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-modules-6.8.0-1020-oracle - 6.8.0-1020.21 linux-modules-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-modules-extra-6.8.0-1020-oracle - 6.8.0-1020.21 linux-modules-extra-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-oracle - 6.8.0-1020.21 linux-oracle-64k - 6.8.0-1020.21 linux-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-oracle-headers-6.8.0-1020 - 6.8.0-1020.21 linux-oracle-lts-24.04 - 6.8.0-1020.21 linux-oracle-tools-6.8.0-1020 - 6.8.0-1020.21 linux-tools-6.8.0-1020-oracle - 6.8.0-1020.21 linux-tools-6.8.0-1020-oracle-64k - 6.8.0-1020.21 linux-tools-oracle - 6.8.0-1020.21 linux-tools-oracle-64k - 6.8.0-1020.21 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1020.21 linux-tools-oracle-lts-24.04 - 6.8.0-1020.21 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-53144 USN-7303-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47709, CVE-2024-49889, CVE-2024-49931, CVE-2024-50008, CVE-2024-49969, CVE-2024-49975, CVE-2024-49958, CVE-2024-47756, CVE-2024-49944, CVE-2024-47707, CVE-2024-47693, CVE-2024-47686, CVE-2024-47734, CVE-2024-47750, CVE-2024-50179, CVE-2024-49942, CVE-2024-49864, CVE-2024-49891, CVE-2024-49965, CVE-2024-49905, CVE-2024-47719, CVE-2024-49877, CVE-2024-47688, CVE-2024-47691, CVE-2024-47710, CVE-2024-47748, CVE-2024-49948, CVE-2024-49998, CVE-2024-47673, CVE-2024-47738, CVE-2024-47701, CVE-2024-47705, CVE-2024-49930, CVE-2024-49985, CVE-2024-50016, CVE-2024-53144, CVE-2023-52917, CVE-2024-47690, CVE-2024-47675, CVE-2024-50176, CVE-2024-49922, CVE-2024-47704, CVE-2024-49982, CVE-2024-47741, CVE-2024-49991, CVE-2024-49902, CVE-2024-49883, CVE-2024-49892, CVE-2024-50002, CVE-2024-49945, CVE-2024-49959, CVE-2024-47732, CVE-2024-49856, CVE-2024-47677, CVE-2024-49978, CVE-2024-49966, CVE-2024-49937, CVE-2024-47744, CVE-2024-49890, CVE-2024-47739, CVE-2024-50012, CVE-2024-47742, CVE-2024-49980, CVE-2024-47706, CVE-2024-49994, CVE-2024-50017, CVE-2024-47697, CVE-2024-49996, CVE-2024-49953, CVE-2024-49871, CVE-2024-47723, CVE-2024-49987, CVE-2024-49917, CVE-2024-49888, CVE-2024-49866, CVE-2024-50005, CVE-2024-47681, CVE-2024-49870, CVE-2024-49898, CVE-2024-49981, CVE-2024-49947, CVE-2024-49918, CVE-2024-49983, CVE-2024-47698, CVE-2024-49850, CVE-2024-50007, CVE-2024-49900, CVE-2024-49923, CVE-2024-49909, CVE-2024-47687, CVE-2024-50015, CVE-2024-47715, CVE-2024-47745, CVE-2024-49926, CVE-2024-49879, CVE-2024-49986, CVE-2024-49929, CVE-2024-49949, CVE-2024-49976, CVE-2024-47749, CVE-2024-47689, CVE-2024-47720, CVE-2024-47743, CVE-2024-49878, CVE-2024-49935, CVE-2024-49955, CVE-2024-49997, CVE-2024-49860, CVE-2024-47703, CVE-2024-50175, CVE-2024-49855, CVE-2024-49861, CVE-2024-49951, CVE-2024-49863, CVE-2024-49882, CVE-2024-50000, CVE-2024-49912, CVE-2024-49974, CVE-2024-49977, CVE-2024-47752, CVE-2024-47700, CVE-2024-49911, CVE-2024-49852, CVE-2024-47740, CVE-2024-47671, CVE-2024-49988, CVE-2024-47699, CVE-2024-47757, CVE-2024-49933, CVE-2024-49913, CVE-2024-49907, CVE-2024-49881, CVE-2024-47751, CVE-2024-47753, CVE-2024-47731, CVE-2024-47730, CVE-2024-49934, CVE-2024-49957, CVE-2024-49938, CVE-2024-47728, CVE-2024-49867, CVE-2024-47754, CVE-2024-49919, CVE-2024-49992, CVE-2024-49950, CVE-2024-49954, CVE-2024-49924, CVE-2024-47670, CVE-2024-50014, CVE-2024-47684, CVE-2024-49884, CVE-2024-47678, CVE-2024-49894, CVE-2024-49859, CVE-2024-47735, CVE-2024-47696, CVE-2024-49999, CVE-2024-49880, CVE-2024-47747, CVE-2024-49885, CVE-2024-49963, CVE-2024-49995, CVE-2024-49897, CVE-2024-49868, CVE-2024-49862, CVE-2024-49928, CVE-2024-47685, CVE-2024-47692, CVE-2024-49927, CVE-2024-47695, CVE-2024-49896, CVE-2024-49875, CVE-2024-49853, CVE-2024-47714, CVE-2024-49989, CVE-2024-49858, CVE-2024-49952, CVE-2024-49973, CVE-2024-49925, CVE-2024-49851, CVE-2024-47712, CVE-2024-49961, CVE-2024-47713, CVE-2024-47718, CVE-2024-49962, CVE-2024-47737, CVE-2024-50001, CVE-2024-49876, CVE-2024-49903, CVE-2024-49939, CVE-2024-49886, CVE-2024-47679, CVE-2024-50006, CVE-2024-49874, CVE-2024-47716, CVE-2024-49895, CVE-2024-47727, CVE-2024-47672, CVE-2024-49901, CVE-2024-47733, CVE-2024-47682, CVE-2024-47702, CVE-2024-50013, CVE-2024-41016, CVE-2024-49960, CVE-2024-49936, CVE-2024-49946, CVE-2024-49915) Update Instructions: Run `sudo pro fix USN-7303-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1019-raspi - 6.8.0-1019.23 linux-headers-6.8.0-1019-raspi - 6.8.0-1019.23 linux-headers-raspi - 6.8.0-1019.23 linux-image-6.8.0-1019-raspi - 6.8.0-1019.23 linux-image-raspi - 6.8.0-1019.23 linux-modules-6.8.0-1019-raspi - 6.8.0-1019.23 linux-raspi - 6.8.0-1019.23 linux-raspi-headers-6.8.0-1019 - 6.8.0-1019.23 linux-raspi-tools-6.8.0-1019 - 6.8.0-1019.23 linux-tools-6.8.0-1019-raspi - 6.8.0-1019.23 linux-tools-raspi - 6.8.0-1019.23 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-53144 USN-7304-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47678, CVE-2024-49952, CVE-2024-47682, CVE-2024-47679, CVE-2024-47748, CVE-2024-47728, CVE-2024-49953, CVE-2024-49883, CVE-2024-47742, CVE-2024-50000, CVE-2024-47733, CVE-2024-47752, CVE-2024-49927, CVE-2024-47713, CVE-2024-49853, CVE-2024-49998, CVE-2024-47672, CVE-2024-49900, CVE-2024-49884, CVE-2024-49876, CVE-2024-47673, CVE-2024-49958, CVE-2024-50274, CVE-2024-49980, CVE-2024-47703, CVE-2024-49891, CVE-2024-47716, CVE-2024-49903, CVE-2024-49868, CVE-2024-47699, CVE-2024-50015, CVE-2024-49896, CVE-2024-49867, CVE-2024-50016, CVE-2024-49862, CVE-2024-49947, CVE-2024-47714, CVE-2024-50179, CVE-2024-50006, CVE-2024-49881, CVE-2024-49933, CVE-2024-49882, CVE-2024-47709, CVE-2024-47686, CVE-2024-49859, CVE-2024-49992, CVE-2024-49957, CVE-2024-47691, CVE-2024-49936, CVE-2024-49878, CVE-2024-49879, CVE-2024-49997, CVE-2024-47697, CVE-2024-49963, CVE-2024-49938, CVE-2024-47723, CVE-2024-47700, CVE-2024-49999, CVE-2024-49923, CVE-2024-49991, CVE-2024-50013, CVE-2024-47730, CVE-2024-47718, CVE-2024-47671, CVE-2024-49977, CVE-2024-53144, CVE-2024-49922, CVE-2024-49985, CVE-2024-47712, CVE-2024-49962, CVE-2024-49907, CVE-2024-49886, CVE-2024-49976, CVE-2024-49902, CVE-2024-47732, CVE-2024-49995, CVE-2024-49942, CVE-2024-47706, CVE-2024-47747, CVE-2024-49949, CVE-2024-49911, CVE-2024-49929, CVE-2024-47737, CVE-2024-47720, CVE-2024-47756, CVE-2024-47688, CVE-2024-47753, CVE-2024-49937, CVE-2024-47684, CVE-2024-47690, CVE-2024-49897, CVE-2024-47705, CVE-2024-49852, CVE-2024-49930, CVE-2024-47681, CVE-2024-50175, CVE-2024-49863, CVE-2024-49969, CVE-2024-49894, CVE-2024-49928, CVE-2024-47698, CVE-2024-47710, CVE-2024-49931, CVE-2024-50008, CVE-2024-49939, CVE-2024-49915, CVE-2024-47757, CVE-2024-49912, CVE-2024-47696, CVE-2024-47702, CVE-2024-49877, CVE-2024-49974, CVE-2024-49919, CVE-2024-49888, CVE-2024-49871, CVE-2024-47685, CVE-2024-47734, CVE-2024-49965, CVE-2024-47707, CVE-2024-49987, CVE-2024-47745, CVE-2024-50001, CVE-2024-49960, CVE-2024-50014, CVE-2024-49994, CVE-2024-49875, CVE-2024-49856, CVE-2024-49926, CVE-2024-47701, CVE-2024-47749, CVE-2024-47715, CVE-2024-49981, CVE-2024-49935, CVE-2024-47754, CVE-2024-47692, CVE-2024-49864, CVE-2024-49983, CVE-2024-49950, CVE-2024-49917, CVE-2024-49924, CVE-2024-47743, CVE-2024-47693, CVE-2024-50176, CVE-2024-47670, CVE-2024-47727, CVE-2024-47739, CVE-2024-49978, CVE-2024-49858, CVE-2024-49861, CVE-2024-49946, CVE-2024-50012, CVE-2024-49934, CVE-2024-49986, CVE-2023-52917, CVE-2024-49870, CVE-2024-49892, CVE-2024-47741, CVE-2024-47731, CVE-2024-47675, CVE-2024-49898, CVE-2024-49959, CVE-2024-49988, CVE-2024-49918, CVE-2024-50002, CVE-2024-49954, CVE-2024-49944, CVE-2024-49996, CVE-2024-49982, CVE-2024-49948, CVE-2024-49901, CVE-2024-47735, CVE-2024-49851, CVE-2024-50007, CVE-2024-49895, CVE-2024-47744, CVE-2024-49889, CVE-2024-50017, CVE-2024-49945, CVE-2024-49890, CVE-2024-49850, CVE-2024-47677, CVE-2024-47704, CVE-2024-49874, CVE-2024-49860, CVE-2024-49961, CVE-2024-49975, CVE-2024-41016, CVE-2024-49951, CVE-2024-49909, CVE-2024-49955, CVE-2024-49885, CVE-2024-50005, CVE-2024-47750, CVE-2024-47695, CVE-2024-49913, CVE-2024-49925, CVE-2024-47689, CVE-2024-49866, CVE-2024-49973, CVE-2024-47751, CVE-2024-49880, CVE-2024-49855, CVE-2024-49989, CVE-2024-47740, CVE-2024-47687, CVE-2024-47738, CVE-2024-47719, CVE-2024-49905, CVE-2024-53064, CVE-2024-49966) Update Instructions: Run `sudo pro fix USN-7304-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-cloud-tools-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-cloud-tools-gkeop - 6.8.0-1006.8 linux-cloud-tools-gkeop-6.8 - 6.8.0-1006.8 linux-gkeop - 6.8.0-1006.8 linux-gkeop-6.8 - 6.8.0-1006.8 linux-gkeop-cloud-tools-6.8.0-1006 - 6.8.0-1006.8 linux-gkeop-headers-6.8.0-1006 - 6.8.0-1006.8 linux-gkeop-tools-6.8.0-1006 - 6.8.0-1006.8 linux-headers-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-headers-gkeop - 6.8.0-1006.8 linux-headers-gkeop-6.8 - 6.8.0-1006.8 linux-image-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-image-gkeop - 6.8.0-1006.8 linux-image-gkeop-6.8 - 6.8.0-1006.8 linux-image-unsigned-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-extra-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-modules-extra-gkeop - 6.8.0-1006.8 linux-modules-extra-gkeop-6.8 - 6.8.0-1006.8 linux-tools-6.8.0-1006-gkeop - 6.8.0-1006.8 linux-tools-gkeop - 6.8.0-1006.8 linux-tools-gkeop-6.8 - 6.8.0-1006.8 No subscription required linux-buildinfo-6.8.0-1019-gke - 6.8.0-1019.23 linux-gke - 6.8.0-1019.23 linux-gke-headers-6.8.0-1019 - 6.8.0-1019.23 linux-gke-tools-6.8.0-1019 - 6.8.0-1019.23 linux-headers-6.8.0-1019-gke - 6.8.0-1019.23 linux-headers-gke - 6.8.0-1019.23 linux-image-6.8.0-1019-gke - 6.8.0-1019.23 linux-image-gke - 6.8.0-1019.23 linux-image-unsigned-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-extra-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-iwlwifi-6.8.0-1019-gke - 6.8.0-1019.23 linux-modules-iwlwifi-gke - 6.8.0-1019.23 linux-tools-6.8.0-1019-gke - 6.8.0-1019.23 linux-tools-gke - 6.8.0-1019.23 No subscription required linux-buildinfo-6.8.0-1024-gcp - 6.8.0-1024.26 linux-buildinfo-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-gcp - 6.8.0-1024.26 linux-gcp-64k - 6.8.0-1024.26 linux-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-gcp-headers-6.8.0-1024 - 6.8.0-1024.26 linux-gcp-lts-24.04 - 6.8.0-1024.26 linux-gcp-tools-6.8.0-1024 - 6.8.0-1024.26 linux-headers-6.8.0-1024-gcp - 6.8.0-1024.26 linux-headers-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-headers-gcp - 6.8.0-1024.26 linux-headers-gcp-64k - 6.8.0-1024.26 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-headers-gcp-lts-24.04 - 6.8.0-1024.26 linux-image-6.8.0-1024-gcp - 6.8.0-1024.26 linux-image-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-image-gcp - 6.8.0-1024.26 linux-image-gcp-64k - 6.8.0-1024.26 linux-image-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-image-gcp-lts-24.04 - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-gcp - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-6.8.0-1024-gcp - 6.8.0-1024.26 linux-modules-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-gcp - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-modules-extra-gcp - 6.8.0-1024.26 linux-modules-extra-gcp-64k - 6.8.0-1024.26 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1024.26 linux-tools-6.8.0-1024-gcp - 6.8.0-1024.26 linux-tools-6.8.0-1024-gcp-64k - 6.8.0-1024.26 linux-tools-gcp - 6.8.0-1024.26 linux-tools-gcp-64k - 6.8.0-1024.26 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1024.26 linux-tools-gcp-lts-24.04 - 6.8.0-1024.26 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-50274 CVE-2024-53064 CVE-2024-53144 USN-7306-1 -- GNU binutils vulnerabilities Ubuntu 24.04 LTS It was discovered that GNU binutils in nm tool is affected by an incorrect access control. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-57360) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-0840) Update Instructions: Run `sudo pro fix USN-7306-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.42-4ubuntu2.4 binutils-aarch64-linux-gnu - 2.42-4ubuntu2.4 binutils-alpha-linux-gnu - 2.42-4ubuntu2.4 binutils-arc-linux-gnu - 2.42-4ubuntu2.4 binutils-arm-linux-gnueabi - 2.42-4ubuntu2.4 binutils-arm-linux-gnueabihf - 2.42-4ubuntu2.4 binutils-common - 2.42-4ubuntu2.4 binutils-dev - 2.42-4ubuntu2.4 binutils-doc - 2.42-4ubuntu2.4 binutils-for-build - 2.42-4ubuntu2.4 binutils-for-host - 2.42-4ubuntu2.4 binutils-hppa-linux-gnu - 2.42-4ubuntu2.4 binutils-hppa64-linux-gnu - 2.42-4ubuntu2.4 binutils-i686-gnu - 2.42-4ubuntu2.4 binutils-i686-kfreebsd-gnu - 2.42-4ubuntu2.4 binutils-i686-linux-gnu - 2.42-4ubuntu2.4 binutils-ia64-linux-gnu - 2.42-4ubuntu2.4 binutils-loongarch64-linux-gnu - 2.42-4ubuntu2.4 binutils-m68k-linux-gnu - 2.42-4ubuntu2.4 binutils-multiarch - 2.42-4ubuntu2.4 binutils-multiarch-dev - 2.42-4ubuntu2.4 binutils-powerpc-linux-gnu - 2.42-4ubuntu2.4 binutils-powerpc64-linux-gnu - 2.42-4ubuntu2.4 binutils-powerpc64le-linux-gnu - 2.42-4ubuntu2.4 binutils-riscv64-linux-gnu - 2.42-4ubuntu2.4 binutils-s390x-linux-gnu - 2.42-4ubuntu2.4 binutils-sh4-linux-gnu - 2.42-4ubuntu2.4 binutils-source - 2.42-4ubuntu2.4 binutils-sparc64-linux-gnu - 2.42-4ubuntu2.4 binutils-x86-64-gnu - 2.42-4ubuntu2.4 binutils-x86-64-kfreebsd-gnu - 2.42-4ubuntu2.4 binutils-x86-64-linux-gnu - 2.42-4ubuntu2.4 binutils-x86-64-linux-gnux32 - 2.42-4ubuntu2.4 libbinutils - 2.42-4ubuntu2.4 libctf-nobfd0 - 2.42-4ubuntu2.4 libctf0 - 2.42-4ubuntu2.4 libgprofng0 - 2.42-4ubuntu2.4 libsframe1 - 2.42-4ubuntu2.4 No subscription required Medium CVE-2024-57360 CVE-2025-0840 USN-7307-1 -- xmltok library vulnerability Ubuntu 24.04 LTS Tim Boddy discovered that Expat, contained within the xmltok library, did not properly handle memory reallocation when processing XML files. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive memory resources. Update Instructions: Run `sudo pro fix USN-7307-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm3 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm3 Available with Ubuntu Pro: https://ubuntu.com/pro Low CVE-2012-1148 USN-7309-1 -- Ruby SAML vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby SAML did not properly validate SAML responses. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5697) It was discovered that Ruby SAML incorrectly utilized the results of XML DOM traversal and canonicalization APIs. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-11428) It was discovered that Ruby SAML did not properly verify the signature of the SAML Response, allowing multiple elements with the same ID. An unauthenticated attacker could use this vulnerability to log in as an abitrary user. (CVE-2024-45409) Update Instructions: Run `sudo pro fix USN-7309-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-saml - 1.15.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2016-5697 CVE-2017-11428 CVE-2024-45409 USN-7310-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - Buffer Sharing and Synchronization framework; - EDAC drivers; - FireWire subsystem; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Powercap sysfs driver; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - UBI file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Bluetooth subsystem; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Perf events; - Kernel fork() syscall; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Task handling mechanism; - Timer substystem drivers; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - IUCV driver; - L2TP protocol; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; - KVM core; (CVE-2024-50244, CVE-2024-56754, CVE-2024-50082, CVE-2024-47737, CVE-2024-50300, CVE-2024-49872, CVE-2024-50180, CVE-2024-50218, CVE-2024-49956, CVE-2024-53189, CVE-2024-56705, CVE-2024-50119, CVE-2024-53192, CVE-2024-49950, CVE-2024-56722, CVE-2024-49943, CVE-2024-50031, CVE-2024-47685, CVE-2024-50296, CVE-2024-49939, CVE-2024-47696, CVE-2024-47752, CVE-2024-49937, CVE-2024-53140, CVE-2024-50236, CVE-2024-50151, CVE-2024-50069, CVE-2024-50170, CVE-2024-50246, CVE-2024-50217, CVE-2024-53125, CVE-2024-50084, CVE-2024-50005, CVE-2024-53137, CVE-2024-50233, CVE-2024-49991, CVE-2024-50067, CVE-2024-50290, CVE-2024-47735, CVE-2024-53133, CVE-2024-50289, CVE-2024-49855, CVE-2024-49868, CVE-2024-56728, CVE-2024-56726, CVE-2024-50012, CVE-2024-53078, CVE-2024-50223, CVE-2024-50143, CVE-2024-50287, CVE-2024-49971, CVE-2024-49900, CVE-2024-50263, CVE-2024-50206, CVE-2024-47707, CVE-2024-47751, CVE-2024-56747, CVE-2024-50260, CVE-2024-50173, CVE-2024-47680, CVE-2024-50009, CVE-2024-53219, CVE-2024-53144, CVE-2024-50008, CVE-2024-53208, CVE-2024-49966, CVE-2024-50104, CVE-2024-50030, CVE-2024-53049, CVE-2024-53201, CVE-2024-50130, CVE-2024-49856, CVE-2024-53095, CVE-2024-50033, CVE-2024-47730, CVE-2024-53216, CVE-2024-50286, CVE-2024-50284, CVE-2024-47744, CVE-2023-52917, CVE-2024-50275, CVE-2024-53114, CVE-2024-49968, CVE-2024-50111, CVE-2024-50000, CVE-2024-53081, CVE-2024-49857, CVE-2024-50262, CVE-2024-50281, CVE-2024-53156, CVE-2024-50225, CVE-2024-53239, CVE-2024-50036, CVE-2024-50187, CVE-2024-53165, CVE-2024-49931, CVE-2024-53111, CVE-2024-49862, CVE-2024-47701, CVE-2024-53091, CVE-2024-50103, CVE-2024-53046, CVE-2024-56678, CVE-2024-56749, CVE-2024-53175, CVE-2024-49970, CVE-2024-50035, CVE-2024-50088, CVE-2024-50297, CVE-2024-47721, CVE-2024-50240, CVE-2024-50076, CVE-2024-56683, CVE-2024-53120, CVE-2024-50074, CVE-2024-50095, CVE-2024-49963, CVE-2024-50158, CVE-2024-50020, CVE-2024-53083, CVE-2024-50029, CVE-2024-56755, CVE-2024-49969, CVE-2024-50022, CVE-2024-50278, CVE-2024-50125, CVE-2024-47706, CVE-2024-50204, CVE-2024-56543, CVE-2024-53108, CVE-2024-49885, CVE-2024-50128, CVE-2024-50062, CVE-2024-50139, CVE-2024-50183, CVE-2024-50288, CVE-2024-56729, CVE-2024-49945, CVE-2024-47695, CVE-2024-56533, CVE-2024-53234, CVE-2024-50002, CVE-2024-50040, CVE-2024-49903, CVE-2024-47702, CVE-2024-47728, CVE-2024-49874, CVE-2024-47718, CVE-2024-53142, CVE-2024-49983, CVE-2024-50211, CVE-2024-50294, CVE-2024-50132, CVE-2024-53236, CVE-2024-50042, CVE-2024-49999, CVE-2024-50001, CVE-2024-50046, CVE-2024-50133, CVE-2024-50256, CVE-2024-49869, CVE-2024-49852, CVE-2024-47717, CVE-2024-56704, CVE-2024-50102, CVE-2024-50150, CVE-2024-49880, CVE-2024-50235, CVE-2024-49892, CVE-2024-53194, CVE-2024-53104, CVE-2024-50232, CVE-2024-50226, CVE-2024-56684, CVE-2024-47713, CVE-2024-50191, CVE-2024-49850, CVE-2024-50277, CVE-2024-53113, CVE-2024-50013, CVE-2024-53221, CVE-2024-50220, CVE-2024-49960, CVE-2024-53228, CVE-2024-50152, CVE-2024-56689, CVE-2024-53220, CVE-2024-50209, CVE-2024-50285, CVE-2024-50197, CVE-2024-53072, CVE-2024-50273, CVE-2024-49928, CVE-2024-53132, CVE-2024-56720, CVE-2024-50194, CVE-2024-50112, CVE-2024-53079, CVE-2024-56696, CVE-2024-47750, CVE-2024-53212, CVE-2024-56541, CVE-2024-50024, CVE-2024-53168, CVE-2024-50247, CVE-2024-50193, CVE-2024-47754, CVE-2024-56540, CVE-2024-50026, CVE-2024-53047, CVE-2024-53151, CVE-2024-50176, CVE-2024-49975, CVE-2024-50034, CVE-2024-50126, CVE-2024-49863, CVE-2024-47693, CVE-2024-49954, CVE-2024-49938, CVE-2024-50171, CVE-2024-50185, CVE-2024-50200, CVE-2024-50201, CVE-2024-53184, CVE-2024-47709, CVE-2024-50138, CVE-2024-49935, CVE-2024-50049, CVE-2024-56537, CVE-2024-50057, CVE-2024-56677, CVE-2024-47743, CVE-2024-50293, CVE-2024-50099, CVE-2024-47720, CVE-2024-50021, CVE-2024-50059, CVE-2024-49871, CVE-2024-49884, CVE-2024-47694, CVE-2024-56723, CVE-2024-47724, CVE-2024-50038, CVE-2024-53123, CVE-2024-53177, CVE-2024-49932, CVE-2024-50196, CVE-2024-50234, CVE-2024-50078, CVE-2024-53043, CVE-2024-49926, CVE-2024-49988, CVE-2024-53187, CVE-2024-53056, CVE-2024-53217, CVE-2024-56745, CVE-2024-47726, CVE-2024-50063, CVE-2024-49987, CVE-2024-49955, CVE-2024-50179, CVE-2024-49866, CVE-2024-50283, CVE-2024-49997, CVE-2024-47742, CVE-2024-56691, CVE-2024-50253, CVE-2024-56690, CVE-2024-47710, CVE-2024-53129, CVE-2024-50190, CVE-2024-50090, CVE-2024-56702, CVE-2024-50148, CVE-2024-53183, CVE-2024-50070, CVE-2024-50154, CVE-2024-50243, CVE-2024-50003, CVE-2024-50117, CVE-2024-56751, CVE-2024-56697, CVE-2024-53166, CVE-2024-53196, CVE-2024-47677, CVE-2024-56679, CVE-2024-49996, CVE-2024-47681, CVE-2024-53181, CVE-2024-47700, CVE-2024-53071, CVE-2024-50015, CVE-2024-53126, CVE-2024-50165, CVE-2024-50172, CVE-2024-53063, CVE-2024-53200, CVE-2024-53135, CVE-2024-49974, CVE-2024-53088, CVE-2024-49936, CVE-2024-53121, CVE-2024-50166, CVE-2024-50087, CVE-2024-53065, CVE-2024-53214, CVE-2024-53076, CVE-2024-53059, CVE-2024-50230, CVE-2024-49985, CVE-2024-50092, CVE-2024-53233, CVE-2024-50047, CVE-2024-56685, CVE-2024-47682, CVE-2024-47705, CVE-2024-50077, CVE-2024-53224, CVE-2024-49887, CVE-2024-49940, CVE-2024-47741, CVE-2024-49858, CVE-2024-56536, CVE-2024-53055, CVE-2024-56687, CVE-2024-50100, CVE-2024-53075, CVE-2024-47699, CVE-2024-53213, CVE-2024-49977, CVE-2024-50268, CVE-2024-53146, CVE-2024-50304, CVE-2024-50096, CVE-2024-53162, CVE-2024-56725, CVE-2024-49953, CVE-2024-53077, CVE-2024-50107, CVE-2024-53226, CVE-2024-53134, CVE-2024-49873, CVE-2024-56548, CVE-2024-53145, CVE-2024-53141, CVE-2024-56741, CVE-2024-53067, CVE-2024-53152, CVE-2024-50072, CVE-2024-50282, CVE-2024-53232, CVE-2024-50140, CVE-2024-53198, CVE-2024-53150, CVE-2024-49876, CVE-2024-50302, CVE-2024-53115, CVE-2024-47692, CVE-2024-50301, CVE-2024-50202, CVE-2024-50155, CVE-2024-56693, CVE-2024-53082, CVE-2024-53167, CVE-2024-56748, CVE-2024-53064, CVE-2024-50227, CVE-2024-56539, CVE-2024-50215, CVE-2024-50043, CVE-2024-50146, CVE-2024-50147, CVE-2024-56699, CVE-2024-50122, CVE-2024-53044, CVE-2024-47712, CVE-2024-53230, CVE-2024-50121, CVE-2024-50216, CVE-2024-53084, CVE-2024-56703, CVE-2024-50178, CVE-2024-49934, CVE-2024-47678, CVE-2024-50271, CVE-2024-50144, CVE-2024-50252, CVE-2024-47734, CVE-2024-47711, CVE-2024-50214, CVE-2024-53100, CVE-2024-56680, CVE-2024-50198, CVE-2024-50025, CVE-2024-50044, CVE-2024-50098, CVE-2024-47745, CVE-2024-49860, CVE-2024-49881, CVE-2024-53048, CVE-2024-56721, CVE-2024-56756, CVE-2024-53171, CVE-2024-49901, CVE-2024-53109, CVE-2024-53061, CVE-2024-49929, CVE-2024-47691, CVE-2024-50045, CVE-2024-47723, CVE-2024-56546, CVE-2024-50157, CVE-2024-53169, CVE-2024-47716, CVE-2024-53093, CVE-2024-50224, CVE-2024-53193, CVE-2024-49895, CVE-2024-47698, CVE-2024-49942, CVE-2024-50167, CVE-2024-53202, CVE-2024-49870, CVE-2024-50291, CVE-2024-50156, CVE-2024-53153, CVE-2024-50272, CVE-2024-50145, CVE-2024-50298, CVE-2024-50274, CVE-2024-56694, CVE-2024-50108, CVE-2024-50222, CVE-2024-53163, CVE-2024-50164, CVE-2024-53062, CVE-2024-50212, CVE-2024-53127, CVE-2024-47688, CVE-2024-49959, CVE-2024-50203, CVE-2024-49927, CVE-2024-50083, CVE-2024-53227, CVE-2024-47697, CVE-2024-53053, CVE-2024-53172, CVE-2024-56752, CVE-2024-50207, CVE-2024-50169, CVE-2024-53176, CVE-2024-53089, CVE-2024-56707, CVE-2024-53195, CVE-2024-49851, CVE-2024-53209, CVE-2024-49972, CVE-2024-53130, CVE-2024-53157, CVE-2024-53094, CVE-2024-50182, CVE-2024-49879, CVE-2024-53191, CVE-2024-49925, CVE-2024-49949, CVE-2024-56534, CVE-2024-47714, CVE-2024-53161, CVE-2024-49992, CVE-2024-47732, CVE-2024-53143, CVE-2024-53119, CVE-2024-50064, CVE-2024-50039, CVE-2024-53087, CVE-2024-49886, CVE-2024-49979, CVE-2024-50041, CVE-2024-50184, CVE-2024-49958, CVE-2024-50221, CVE-2024-56688, CVE-2024-49941, CVE-2024-50245, CVE-2024-50017, CVE-2024-53180, CVE-2024-56535, CVE-2024-50142, CVE-2024-50295, CVE-2024-56708, CVE-2024-50016, CVE-2024-49902, CVE-2024-50120, CVE-2024-47748, CVE-2024-49982, CVE-2024-50257, CVE-2024-50086, CVE-2024-50261, CVE-2024-53188, CVE-2024-49888, CVE-2024-53106, CVE-2024-50073, CVE-2024-50186, CVE-2024-56544, CVE-2024-47739, CVE-2024-50238, CVE-2024-56739, CVE-2024-49964, CVE-2024-47686, CVE-2024-46869, CVE-2024-53116, CVE-2024-50014, CVE-2024-53231, CVE-2024-53138, CVE-2024-50213, CVE-2024-50265, CVE-2024-49998, CVE-2024-50292, CVE-2024-50137, CVE-2024-50114, CVE-2024-53237, CVE-2024-49952, CVE-2024-53074, CVE-2024-49981, CVE-2024-47733, CVE-2024-50019, CVE-2024-47719, CVE-2024-53068, CVE-2024-49944, CVE-2024-50066, CVE-2024-50007, CVE-2024-53155, CVE-2024-47756, CVE-2024-49947, CVE-2024-49951, CVE-2024-50065, CVE-2024-49957, CVE-2024-50116, CVE-2024-50188, CVE-2024-50255, CVE-2024-53197, CVE-2024-50267, CVE-2024-50124, CVE-2024-53069, CVE-2024-53139, CVE-2024-47676, CVE-2024-56545, CVE-2024-53085, CVE-2024-50163, CVE-2024-53092, CVE-2024-53099, CVE-2024-49889, CVE-2024-53052, CVE-2024-49995, CVE-2024-49976, CVE-2024-50110, CVE-2024-50192, CVE-2024-50208, CVE-2024-50276, CVE-2024-53170, CVE-2024-50259, CVE-2024-47731, CVE-2024-49924, CVE-2024-56532, CVE-2024-50048, CVE-2024-49965, CVE-2024-53147, CVE-2024-50205, CVE-2024-49859, CVE-2024-53066, CVE-2024-47687, CVE-2024-50149, CVE-2024-49864, CVE-2024-49867, CVE-2024-50160, CVE-2024-53058, CVE-2024-47753, CVE-2024-49883, CVE-2024-53199, CVE-2024-56746, CVE-2024-50094, CVE-2024-49946, CVE-2024-50006, CVE-2024-53101, CVE-2024-49891, CVE-2024-50075, CVE-2024-47747, CVE-2024-47740, CVE-2024-50248, CVE-2024-50162, CVE-2024-53090, CVE-2024-53203, CVE-2024-50242, CVE-2024-49961, CVE-2024-50085, CVE-2024-50299, CVE-2024-49980, CVE-2024-50280, CVE-2024-53107, CVE-2024-50199, CVE-2024-53122, CVE-2024-56674, CVE-2024-50079, CVE-2024-50060, CVE-2024-53210, CVE-2024-50177, CVE-2024-53223, CVE-2024-50127, CVE-2024-53190, CVE-2022-49034, CVE-2024-56744, CVE-2024-50136, CVE-2024-47675, CVE-2024-50303, CVE-2024-50123, CVE-2024-47738, CVE-2024-50239, CVE-2024-50135, CVE-2024-53218, CVE-2024-50109, CVE-2024-56724, CVE-2024-56681, CVE-2024-50027, CVE-2024-50081, CVE-2024-50068, CVE-2024-50101, CVE-2024-50071, CVE-2024-50129, CVE-2024-50091, CVE-2024-53112, CVE-2024-50181, CVE-2024-50080, CVE-2024-47703, CVE-2024-47727, CVE-2024-53215, CVE-2024-53105, CVE-2024-50174, CVE-2024-50105, CVE-2024-56700, CVE-2024-53173, CVE-2024-49865, CVE-2024-49973, CVE-2024-56538, CVE-2024-50251, CVE-2024-56692, CVE-2024-47671, CVE-2024-50189, CVE-2024-49853, CVE-2024-50153, CVE-2024-53124, CVE-2024-56549, CVE-2024-53160, CVE-2024-53174, CVE-2024-53117, CVE-2024-50279, CVE-2024-50118, CVE-2024-47757, CVE-2024-50055, CVE-2024-49875, CVE-2024-50141, CVE-2024-49890, CVE-2024-49878, CVE-2024-50134, CVE-2024-53042, CVE-2024-56727, CVE-2024-49861, CVE-2024-49948, CVE-2024-50010, CVE-2024-49930, CVE-2024-49877, CVE-2024-47690, CVE-2024-50115, CVE-2024-50254, CVE-2024-50250, CVE-2024-47679, CVE-2024-50258, CVE-2024-53128, CVE-2024-49994, CVE-2024-53154, CVE-2024-50037, CVE-2024-53149, CVE-2024-50266, CVE-2024-50061, CVE-2024-56698, CVE-2024-53118, CVE-2024-47689, CVE-2024-47708, CVE-2024-50131, CVE-2024-50168, CVE-2024-53158, CVE-2024-49894, CVE-2024-50056, CVE-2024-50231, CVE-2024-50270, CVE-2024-50269, CVE-2024-50237, CVE-2024-56742, CVE-2024-49882, CVE-2024-47749, CVE-2024-49962, CVE-2024-49933, CVE-2024-53045, CVE-2024-50028, CVE-2024-53178, CVE-2024-50229, CVE-2024-50023, CVE-2024-50161, CVE-2024-56701, CVE-2024-49978, CVE-2024-50093, CVE-2024-50195, CVE-2024-49986, CVE-2024-53098, CVE-2024-53131, CVE-2024-47684, CVE-2024-53148, CVE-2024-50058, CVE-2024-53086, CVE-2024-50113, CVE-2024-49989, CVE-2024-50106, CVE-2024-53080, CVE-2024-53229, CVE-2024-50159, CVE-2024-56531, CVE-2024-53110, CVE-2024-47736, CVE-2024-56542, CVE-2024-47746) Update Instructions: Run `sudo pro fix USN-7310-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1015-oem - 6.11.0-1015.15 linux-headers-6.11.0-1015-oem - 6.11.0-1015.15 linux-headers-oem-24.04b - 6.11.0-1015.15 linux-image-6.11.0-1015-oem - 6.11.0-1015.15 linux-image-oem-24.04b - 6.11.0-1015.15 linux-image-uc-6.11.0-1015-oem - 6.11.0-1015.15 linux-image-uc-oem-24.04b - 6.11.0-1015.15 linux-image-unsigned-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu6-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu6-oem-24.04b - 6.11.0-1015.15 linux-modules-ipu7-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-ipu7-oem-24.04b - 6.11.0-1015.15 linux-modules-iwlwifi-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1015.15 linux-modules-usbio-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-usbio-oem-24.04b - 6.11.0-1015.15 linux-modules-vision-6.11.0-1015-oem - 6.11.0-1015.15 linux-modules-vision-oem-24.04b - 6.11.0-1015.15 linux-oem-24.04b - 6.11.0-1015.15 linux-oem-6.11-headers-6.11.0-1015 - 6.11.0-1015.15 linux-oem-6.11-tools-6.11.0-1015 - 6.11.0-1015.15 linux-tools-6.11.0-1015-oem - 6.11.0-1015.15 linux-tools-oem-24.04b - 6.11.0-1015.15 No subscription required High CVE-2022-49034 CVE-2024-46869 CVE-2024-47671 CVE-2024-47675 CVE-2024-47676 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47680 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47694 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47708 CVE-2024-47709 CVE-2024-47710 CVE-2024-47711 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47716 CVE-2024-47717 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47721 CVE-2024-47723 CVE-2024-47724 CVE-2024-47726 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47736 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47746 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49857 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49865 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49869 CVE-2024-49870 CVE-2024-49871 CVE-2024-49872 CVE-2024-49873 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49887 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49932 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49940 CVE-2024-49941 CVE-2024-49942 CVE-2024-49943 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49956 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49964 CVE-2024-49965 CVE-2024-49966 CVE-2024-49968 CVE-2024-49969 CVE-2024-49970 CVE-2024-49971 CVE-2024-49972 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49979 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50003 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50010 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50033 CVE-2024-50034 CVE-2024-50035 CVE-2024-50036 CVE-2024-50037 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50043 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50067 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50071 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50079 CVE-2024-50080 CVE-2024-50081 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50091 CVE-2024-50092 CVE-2024-50093 CVE-2024-50094 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50100 CVE-2024-50101 CVE-2024-50102 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50106 CVE-2024-50107 CVE-2024-50108 CVE-2024-50109 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50113 CVE-2024-50114 CVE-2024-50115 CVE-2024-50116 CVE-2024-50117 CVE-2024-50118 CVE-2024-50119 CVE-2024-50120 CVE-2024-50121 CVE-2024-50122 CVE-2024-50123 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50129 CVE-2024-50130 CVE-2024-50131 CVE-2024-50132 CVE-2024-50133 CVE-2024-50134 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50144 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50148 CVE-2024-50149 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50157 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50161 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50165 CVE-2024-50166 CVE-2024-50167 CVE-2024-50168 CVE-2024-50169 CVE-2024-50170 CVE-2024-50171 CVE-2024-50172 CVE-2024-50173 CVE-2024-50174 CVE-2024-50176 CVE-2024-50177 CVE-2024-50178 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50190 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50203 CVE-2024-50204 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50211 CVE-2024-50212 CVE-2024-50213 CVE-2024-50214 CVE-2024-50215 CVE-2024-50216 CVE-2024-50217 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50227 CVE-2024-50229 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50253 CVE-2024-50254 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50260 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50266 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50277 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50281 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50293 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50302 CVE-2024-50303 CVE-2024-50304 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53049 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53056 CVE-2024-53058 CVE-2024-53059 CVE-2024-53061 CVE-2024-53062 CVE-2024-53063 CVE-2024-53064 CVE-2024-53065 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53069 CVE-2024-53071 CVE-2024-53072 CVE-2024-53074 CVE-2024-53075 CVE-2024-53076 CVE-2024-53077 CVE-2024-53078 CVE-2024-53079 CVE-2024-53080 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53092 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53098 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53104 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53116 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53124 CVE-2024-53125 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53132 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53137 CVE-2024-53138 CVE-2024-53139 CVE-2024-53140 CVE-2024-53141 CVE-2024-53142 CVE-2024-53143 CVE-2024-53144 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53149 CVE-2024-53150 CVE-2024-53151 CVE-2024-53152 CVE-2024-53153 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53165 CVE-2024-53166 CVE-2024-53167 CVE-2024-53168 CVE-2024-53169 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53187 CVE-2024-53188 CVE-2024-53189 CVE-2024-53190 CVE-2024-53191 CVE-2024-53192 CVE-2024-53193 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53199 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53212 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53216 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56534 CVE-2024-56535 CVE-2024-56536 CVE-2024-56537 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56541 CVE-2024-56542 CVE-2024-56543 CVE-2024-56544 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56674 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56680 CVE-2024-56681 CVE-2024-56683 CVE-2024-56684 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56696 CVE-2024-56697 CVE-2024-56698 CVE-2024-56699 CVE-2024-56700 CVE-2024-56701 CVE-2024-56702 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56749 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2025-0927 USN-7311-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-49867, CVE-2024-47675, CVE-2024-49999, CVE-2024-49884, CVE-2024-49992, CVE-2024-49945, CVE-2024-49889, CVE-2024-49890, CVE-2024-49900, CVE-2024-49934, CVE-2024-49976, CVE-2024-49878, CVE-2024-50008, CVE-2024-49919, CVE-2024-47698, CVE-2024-47731, CVE-2024-47673, CVE-2024-49959, CVE-2024-47715, CVE-2024-49912, CVE-2024-47702, CVE-2024-50007, CVE-2024-49953, CVE-2024-49929, CVE-2024-47730, CVE-2024-49966, CVE-2024-47756, CVE-2024-47687, CVE-2024-50002, CVE-2024-49911, CVE-2024-47714, CVE-2024-47704, CVE-2024-50017, CVE-2024-47709, CVE-2024-49858, CVE-2024-47712, CVE-2024-49870, CVE-2024-49883, CVE-2024-47672, CVE-2024-49963, CVE-2024-49926, CVE-2024-49860, CVE-2024-47748, CVE-2024-49928, CVE-2024-49931, CVE-2024-47749, CVE-2024-49913, CVE-2024-49957, CVE-2024-49948, CVE-2024-47732, CVE-2024-47753, CVE-2024-47727, CVE-2024-49896, CVE-2024-47707, CVE-2024-47743, CVE-2024-49915, CVE-2024-47695, CVE-2024-49960, CVE-2024-49935, CVE-2024-49868, CVE-2024-49918, CVE-2024-49969, CVE-2024-53164, CVE-2024-49879, CVE-2024-50012, CVE-2024-50000, CVE-2024-49974, CVE-2024-49998, CVE-2024-49933, CVE-2024-47733, CVE-2024-49924, CVE-2024-47757, CVE-2024-47699, CVE-2024-49983, CVE-2024-50016, CVE-2024-49907, CVE-2024-49965, CVE-2024-49859, CVE-2024-50013, CVE-2024-49871, CVE-2024-49994, CVE-2024-49850, CVE-2024-49947, CVE-2024-49955, CVE-2024-49962, CVE-2024-47692, CVE-2024-53141, CVE-2024-50014, CVE-2024-47689, CVE-2024-49874, CVE-2024-50005, CVE-2024-47741, CVE-2024-49880, CVE-2024-47738, CVE-2024-47745, CVE-2024-49917, CVE-2024-47728, CVE-2024-49856, CVE-2024-49925, CVE-2024-47671, CVE-2023-52917, CVE-2024-47679, CVE-2024-49975, CVE-2024-47734, CVE-2024-47720, CVE-2024-47686, CVE-2024-49892, CVE-2024-49936, CVE-2024-49888, CVE-2024-49909, CVE-2024-49986, CVE-2024-49930, CVE-2024-47740, CVE-2024-49923, CVE-2024-47754, CVE-2024-50179, CVE-2024-49978, CVE-2024-47735, CVE-2024-49886, CVE-2024-49903, CVE-2024-47681, CVE-2024-49897, CVE-2024-49951, CVE-2024-49946, CVE-2024-49954, CVE-2024-47691, CVE-2024-49863, CVE-2024-47719, CVE-2024-47693, CVE-2024-47713, CVE-2024-50006, CVE-2024-49855, CVE-2024-49851, CVE-2024-49894, CVE-2024-49895, CVE-2024-49987, CVE-2024-47700, CVE-2024-47688, CVE-2024-49982, CVE-2024-47685, CVE-2024-53144, CVE-2024-47670, CVE-2024-47696, CVE-2024-47710, CVE-2024-47737, CVE-2024-49988, CVE-2024-47684, CVE-2024-47718, CVE-2024-49876, CVE-2024-49852, CVE-2024-49980, CVE-2024-49877, CVE-2024-50175, CVE-2024-49981, CVE-2024-47677, CVE-2024-49973, CVE-2024-49922, CVE-2024-50015, CVE-2024-49938, CVE-2024-47752, CVE-2024-49902, CVE-2024-49944, CVE-2024-49952, CVE-2024-47747, CVE-2024-41016, CVE-2024-50001, CVE-2024-49891, CVE-2024-47703, CVE-2024-47744, CVE-2024-49861, CVE-2024-49875, CVE-2024-49901, CVE-2024-49881, CVE-2024-49937, CVE-2024-47706, CVE-2024-47690, CVE-2024-49958, CVE-2024-49961, CVE-2024-49882, CVE-2024-47739, CVE-2024-49996, CVE-2024-49905, CVE-2024-47705, CVE-2024-49942, CVE-2024-47697, CVE-2024-47723, CVE-2024-49853, CVE-2024-49862, CVE-2024-47751, CVE-2024-49950, CVE-2024-50176, CVE-2024-49939, CVE-2024-49864, CVE-2024-49997, CVE-2024-49995, CVE-2024-49885, CVE-2024-49949, CVE-2024-53103, CVE-2024-49991, CVE-2024-49866, CVE-2024-49977, CVE-2024-47682, CVE-2024-49927, CVE-2024-49985, CVE-2024-49898, CVE-2024-47678, CVE-2024-47701, CVE-2024-47742, CVE-2024-47750, CVE-2024-47716, CVE-2024-49989) Update Instructions: Run `sudo pro fix USN-7311-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1023.25 linux-aws-cloud-tools-6.8.0-1023 - 6.8.0-1023.25 linux-aws-headers-6.8.0-1023 - 6.8.0-1023.25 linux-aws-lts-24.04 - 6.8.0-1023.25 linux-aws-tools-6.8.0-1023 - 6.8.0-1023.25 linux-buildinfo-6.8.0-1023-aws - 6.8.0-1023.25 linux-cloud-tools-6.8.0-1023-aws - 6.8.0-1023.25 linux-headers-6.8.0-1023-aws - 6.8.0-1023.25 linux-headers-aws - 6.8.0-1023.25 linux-headers-aws-lts-24.04 - 6.8.0-1023.25 linux-image-6.8.0-1023-aws - 6.8.0-1023.25 linux-image-aws - 6.8.0-1023.25 linux-image-aws-lts-24.04 - 6.8.0-1023.25 linux-image-unsigned-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-extra-6.8.0-1023-aws - 6.8.0-1023.25 linux-modules-extra-aws - 6.8.0-1023.25 linux-modules-extra-aws-lts-24.04 - 6.8.0-1023.25 linux-tools-6.8.0-1023-aws - 6.8.0-1023.25 linux-tools-aws - 6.8.0-1023.25 linux-tools-aws-lts-24.04 - 6.8.0-1023.25 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49969 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-53103 CVE-2024-53141 CVE-2024-53144 CVE-2024-53164 USN-7312-1 -- openNDS vulnerability Ubuntu 24.04 LTS It was discovered that openNDS did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7312-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: opennds - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 opennds-daemon - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 opennds-daemon-common - 10.2.0+dfsg-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-25763 USN-7313-1 -- Erlang vulnerability Ubuntu 24.04 LTS It was discovered that Erlang incorrectly handled SFTP packet sizes. A remote attacker could possibly use this issue to cause Erlang to consume resources, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7313-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.1 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.1 No subscription required Medium CVE-2025-26618 USN-7314-1 -- Kerberos vulnerabilities Ubuntu 24.04 LTS It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461) It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462) It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528) Update Instructions: Run `sudo pro fix USN-7314-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.5 krb5-doc - 1.20.1-6ubuntu2.5 krb5-gss-samples - 1.20.1-6ubuntu2.5 krb5-k5tls - 1.20.1-6ubuntu2.5 krb5-kdc - 1.20.1-6ubuntu2.5 krb5-kdc-ldap - 1.20.1-6ubuntu2.5 krb5-kpropd - 1.20.1-6ubuntu2.5 krb5-locales - 1.20.1-6ubuntu2.5 krb5-multidev - 1.20.1-6ubuntu2.5 krb5-otp - 1.20.1-6ubuntu2.5 krb5-pkinit - 1.20.1-6ubuntu2.5 krb5-user - 1.20.1-6ubuntu2.5 libgssapi-krb5-2 - 1.20.1-6ubuntu2.5 libgssrpc4t64 - 1.20.1-6ubuntu2.5 libk5crypto3 - 1.20.1-6ubuntu2.5 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.5 libkadm5srv-mit12 - 1.20.1-6ubuntu2.5 libkdb5-10t64 - 1.20.1-6ubuntu2.5 libkrad-dev - 1.20.1-6ubuntu2.5 libkrad0 - 1.20.1-6ubuntu2.5 libkrb5-3 - 1.20.1-6ubuntu2.5 libkrb5-dev - 1.20.1-6ubuntu2.5 libkrb5support0 - 1.20.1-6ubuntu2.5 No subscription required Medium CVE-2024-26458 CVE-2024-26461 CVE-2024-26462 CVE-2025-24528 USN-7315-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Stephen Fewer discovered that PostgreSQL incorrectly handled quoting syntax in certain scenarios. A remote attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-7315-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.8-0ubuntu0.24.04.1 libecpg-dev - 16.8-0ubuntu0.24.04.1 libecpg6 - 16.8-0ubuntu0.24.04.1 libpgtypes3 - 16.8-0ubuntu0.24.04.1 libpq-dev - 16.8-0ubuntu0.24.04.1 libpq5 - 16.8-0ubuntu0.24.04.1 postgresql-16 - 16.8-0ubuntu0.24.04.1 postgresql-client-16 - 16.8-0ubuntu0.24.04.1 postgresql-doc-16 - 16.8-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.8-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.8-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.8-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.8-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-1094 USN-7316-1 -- Raptor vulnerabilities Ubuntu 24.04 LTS It was discovered that Raptor incorrectly handled memory operations when processing certain input files. A remote attacker could possibly use this issue to cause Raptor to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2020-25713) It was discovered that Raptor incorrectly handled parsing certain tuples. A remote attacker could possibly use this issue to cause Raptor to crash, resulting in a denial of service. (CVE-2024-57822) It was discovered that Raptor incorrectly handled parsing certain turtles. A remote attacker could use this issue to cause Raptor to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-57823) Update Instructions: Run `sudo pro fix USN-7316-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libraptor2-0 - 2.0.16-3ubuntu0.1 libraptor2-dev - 2.0.16-3ubuntu0.1 libraptor2-doc - 2.0.16-3ubuntu0.1 raptor2-utils - 2.0.16-3ubuntu0.1 No subscription required Medium CVE-2020-25713 CVE-2024-57822 CVE-2024-57823 USN-7317-1 -- wpa_supplicant and hostapd vulnerabilities Ubuntu 24.04 LTS George Chatzisofroniou and Panayiotis Kotzanikolaou discovered that wpa_supplicant and hostapd reused encryption elements in the PKEX protocol. An attacker could possibly use this issue to impersonate a wireless access point, and obtain sensitive information. (CVE-2022-37660) Daniel De Almeida Braga, Mohamed Sabt, and Pierre-Alain Fouque discovered that wpa_supplicant and hostapd were vulnerable to side channel attacks due to the cache access patterns. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-23303, CVE-2022-23304) Update Instructions: Run `sudo pro fix USN-7317-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.2 hostapd - 2:2.10-21ubuntu0.2 libwpa-client-dev - 2:2.10-21ubuntu0.2 wpagui - 2:2.10-21ubuntu0.2 wpasupplicant - 2:2.10-21ubuntu0.2 No subscription required Medium CVE-2022-23303 CVE-2022-23304 CVE-2022-37660 USN-7319-1 -- cmark-gfm vulnerabilities Ubuntu 24.04 LTS It was discovered that cmark-gfm's autolink extension did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39209) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-22483) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-22484) It was discovered that cmark-gfm did not correctly handle parsing large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-22486, CVE-2023-26485) Update Instructions: Run `sudo pro fix USN-7319-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cmark-gfm - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-dev - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-extensions-dev - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm-extensions0.29.0.gfm.6 - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 libcmark-gfm0.29.0.gfm.6 - 0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-39209 CVE-2023-22483 CVE-2023-22484 CVE-2023-22486 CVE-2023-26485 USN-7320-1 -- GPAC vulnerabilities Ubuntu 24.04 LTS It was discovered that the GPAC MP4Box utility incorrectly handled certain AC3 files, which could lead to an out-of-bounds read. A remote attacker could use this issue to cause MP4Box to crash, resulting in a denial of service (system crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-5520, CVE-2024-0322) It was discovered that the GPAC MP4Box utility incorrectly handled certain malformed text files. If a user or automated system using MP4Box were tricked into opening a specially crafted RST file, an attacker could use this issue to cause a denial of service (system crash) or execute arbitrary code. (CVE-2024-0321) Update Instructions: Run `sudo pro fix USN-7320-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gpac - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 gpac-modules-base - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 libgpac-dev - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 libgpac12t64 - 2.2.1+dfsg1-3.1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-5520 CVE-2024-0321 CVE-2024-0322 USN-7321-1 -- Redis vulnerabilities Ubuntu 24.04 LTS It was discovered that Redis incorrectly handled certain memory operations during pattern matching. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-31228) It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-46981) It was discovered that Redis incorrectly handled some malformed ACL selectors. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.10 and Ubuntu 24.04 LTS. (CVE-2024-51741) Update Instructions: Run `sudo pro fix USN-7321-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: redis - 5:7.0.15-1ubuntu0.24.04.1 redis-sentinel - 5:7.0.15-1ubuntu0.24.04.1 redis-server - 5:7.0.15-1ubuntu0.24.04.1 redis-tools - 5:7.0.15-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-31228 CVE-2024-46981 CVE-2024-51741 USN-7322-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - Networking core; (CVE-2024-56672, CVE-2024-56658) Update Instructions: Run `sudo pro fix USN-7322-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1016-oem - 6.11.0-1016.16 linux-headers-6.11.0-1016-oem - 6.11.0-1016.16 linux-headers-oem-24.04b - 6.11.0-1016.16 linux-image-6.11.0-1016-oem - 6.11.0-1016.16 linux-image-oem-24.04b - 6.11.0-1016.16 linux-image-uc-6.11.0-1016-oem - 6.11.0-1016.16 linux-image-uc-oem-24.04b - 6.11.0-1016.16 linux-image-unsigned-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu6-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu6-oem-24.04b - 6.11.0-1016.16 linux-modules-ipu7-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-ipu7-oem-24.04b - 6.11.0-1016.16 linux-modules-iwlwifi-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1016.16 linux-modules-usbio-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-usbio-oem-24.04b - 6.11.0-1016.16 linux-modules-vision-6.11.0-1016-oem - 6.11.0-1016.16 linux-modules-vision-oem-24.04b - 6.11.0-1016.16 linux-oem-24.04b - 6.11.0-1016.16 linux-oem-6.11-headers-6.11.0-1016 - 6.11.0-1016.16 linux-oem-6.11-tools-6.11.0-1016 - 6.11.0-1016.16 linux-tools-6.11.0-1016-oem - 6.11.0-1016.16 linux-tools-oem-24.04b - 6.11.0-1016.16 No subscription required High CVE-2024-56658 CVE-2024-56672 USN-7323-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - Networking core; (CVE-2024-56672, CVE-2024-56658) Update Instructions: Run `sudo pro fix USN-7323-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-buildinfo-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-cloud-tools-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-headers-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-hwe-6.11-headers-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-hwe-6.11-tools-6.11.0-19 - 6.11.0-19.19~24.04.1 linux-image-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-uc-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-uc-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-image-unsigned-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-image-unsigned-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-modules-extra-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu6-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-ipu7-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-usbio-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-modules-vision-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-6.11.0-19-generic - 6.11.0-19.19~24.04.1 linux-tools-6.11.0-19-generic-64k - 6.11.0-19.19~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-19.19~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-19.19~24.04.1 No subscription required High CVE-2024-56658 CVE-2024-56672 CVE-2025-0927 USN-7324-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7324-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-bpf-dev - 6.8.0-55.57 linux-buildinfo-6.8.0-55-generic - 6.8.0-55.57 linux-buildinfo-6.8.0-55-generic-64k - 6.8.0-55.57 linux-cloud-tools-6.8.0-55 - 6.8.0-55.57 linux-cloud-tools-6.8.0-55-generic - 6.8.0-55.57 linux-cloud-tools-common - 6.8.0-55.57 linux-cloud-tools-generic - 6.8.0-55.57 linux-cloud-tools-virtual - 6.8.0-55.57 linux-crashdump - 6.8.0-55.57 linux-doc - 6.8.0-55.57 linux-generic - 6.8.0-55.57 linux-generic-64k - 6.8.0-55.57 linux-generic-lpae - 6.8.0-55.57 linux-headers-6.8.0-55 - 6.8.0-55.57 linux-headers-6.8.0-55-generic - 6.8.0-55.57 linux-headers-6.8.0-55-generic-64k - 6.8.0-55.57 linux-headers-generic - 6.8.0-55.57 linux-headers-generic-64k - 6.8.0-55.57 linux-headers-generic-lpae - 6.8.0-55.57 linux-headers-kvm - 6.8.0-55.57 linux-headers-laptop-23.10 - 6.8.0-55.57 linux-headers-oem-20.04 - 6.8.0-55.57 linux-headers-oem-20.04b - 6.8.0-55.57 linux-headers-oem-20.04c - 6.8.0-55.57 linux-headers-oem-20.04d - 6.8.0-55.57 linux-headers-oem-22.04 - 6.8.0-55.57 linux-headers-virtual - 6.8.0-55.57 linux-image-6.8.0-55-generic - 6.8.0-55.57 linux-image-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-extra-virtual - 6.8.0-55.57 linux-image-generic - 6.8.0-55.57 linux-image-generic-64k - 6.8.0-55.57 linux-image-generic-lpae - 6.8.0-55.57 linux-image-kvm - 6.8.0-55.57 linux-image-laptop-23.10 - 6.8.0-55.57 linux-image-oem-20.04 - 6.8.0-55.57 linux-image-oem-20.04b - 6.8.0-55.57 linux-image-oem-20.04c - 6.8.0-55.57 linux-image-oem-20.04d - 6.8.0-55.57 linux-image-oem-22.04 - 6.8.0-55.57 linux-image-uc-6.8.0-55-generic - 6.8.0-55.57 linux-image-uc-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-uc-generic - 6.8.0-55.57 linux-image-unsigned-6.8.0-55-generic - 6.8.0-55.57 linux-image-unsigned-6.8.0-55-generic-64k - 6.8.0-55.57 linux-image-virtual - 6.8.0-55.57 linux-kvm - 6.8.0-55.57 linux-laptop-23.10 - 6.8.0-55.57 linux-lib-rust-6.8.0-55-generic - 6.8.0-55.57 linux-libc-dev - 6.8.0-55.57 linux-modules-6.8.0-55-generic - 6.8.0-55.57 linux-modules-6.8.0-55-generic-64k - 6.8.0-55.57 linux-modules-extra-6.8.0-55-generic - 6.8.0-55.57 linux-modules-ipu6-6.8.0-55-generic - 6.8.0-55.57 linux-modules-ipu6-generic - 6.8.0-55.57 linux-modules-iwlwifi-6.8.0-55-generic - 6.8.0-55.57 linux-modules-iwlwifi-generic - 6.8.0-55.57 linux-modules-iwlwifi-oem-20.04 - 6.8.0-55.57 linux-modules-iwlwifi-oem-20.04d - 6.8.0-55.57 linux-modules-iwlwifi-oem-22.04 - 6.8.0-55.57 linux-modules-usbio-6.8.0-55-generic - 6.8.0-55.57 linux-modules-usbio-generic - 6.8.0-55.57 linux-oem-20.04 - 6.8.0-55.57 linux-oem-20.04b - 6.8.0-55.57 linux-oem-20.04c - 6.8.0-55.57 linux-oem-20.04d - 6.8.0-55.57 linux-oem-22.04 - 6.8.0-55.57 linux-source - 6.8.0-55.57 linux-source-6.8.0 - 6.8.0-55.57 linux-tools-6.8.0-55 - 6.8.0-55.57 linux-tools-6.8.0-55-generic - 6.8.0-55.57 linux-tools-6.8.0-55-generic-64k - 6.8.0-55.57 linux-tools-common - 6.8.0-55.57 linux-tools-generic - 6.8.0-55.57 linux-tools-generic-64k - 6.8.0-55.57 linux-tools-generic-lpae - 6.8.0-55.57 linux-tools-host - 6.8.0-55.57 linux-tools-kvm - 6.8.0-55.57 linux-tools-laptop-23.10 - 6.8.0-55.57 linux-tools-oem-20.04 - 6.8.0-55.57 linux-tools-oem-20.04b - 6.8.0-55.57 linux-tools-oem-20.04c - 6.8.0-55.57 linux-tools-oem-20.04d - 6.8.0-55.57 linux-tools-oem-22.04 - 6.8.0-55.57 linux-tools-virtual - 6.8.0-55.57 linux-virtual - 6.8.0-55.57 No subscription required linux-buildinfo-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-buildinfo-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-cloud-tools-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-cloud-tools-lowlatency - 6.8.0-55.57.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-headers-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-headers-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-headers-lowlatency - 6.8.0-55.57.1 linux-headers-lowlatency-64k - 6.8.0-55.57.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-image-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-image-lowlatency - 6.8.0-55.57.1 linux-image-lowlatency-64k - 6.8.0-55.57.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-image-unsigned-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-image-unsigned-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-lowlatency - 6.8.0-55.57.1 linux-lowlatency-64k - 6.8.0-55.57.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-lowlatency-cloud-tools-6.8.0-55 - 6.8.0-55.57.1 linux-lowlatency-headers-6.8.0-55 - 6.8.0-55.57.1 linux-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 linux-lowlatency-lib-rust-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-lowlatency-tools-6.8.0-55 - 6.8.0-55.57.1 linux-modules-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-modules-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-modules-iwlwifi-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-modules-iwlwifi-lowlatency - 6.8.0-55.57.1 linux-tools-6.8.0-55-lowlatency - 6.8.0-55.57.1 linux-tools-6.8.0-55-lowlatency-64k - 6.8.0-55.57.1 linux-tools-lowlatency - 6.8.0-55.57.1 linux-tools-lowlatency-64k - 6.8.0-55.57.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-55.57.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-55.57.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-55.57.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-55.57.1 No subscription required High CVE-2024-53104 USN-7325-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1020-raspi - 6.8.0-1020.24 linux-headers-6.8.0-1020-raspi - 6.8.0-1020.24 linux-headers-raspi - 6.8.0-1020.24 linux-image-6.8.0-1020-raspi - 6.8.0-1020.24 linux-image-raspi - 6.8.0-1020.24 linux-modules-6.8.0-1020-raspi - 6.8.0-1020.24 linux-raspi - 6.8.0-1020.24 linux-raspi-headers-6.8.0-1020 - 6.8.0-1020.24 linux-raspi-tools-6.8.0-1020 - 6.8.0-1020.24 linux-tools-6.8.0-1020-raspi - 6.8.0-1020.24 linux-tools-raspi - 6.8.0-1020.24 No subscription required linux-buildinfo-6.8.0-1021-oracle - 6.8.0-1021.22 linux-buildinfo-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-headers-6.8.0-1021-oracle - 6.8.0-1021.22 linux-headers-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-headers-oracle - 6.8.0-1021.22 linux-headers-oracle-64k - 6.8.0-1021.22 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-headers-oracle-lts-24.04 - 6.8.0-1021.22 linux-image-6.8.0-1021-oracle - 6.8.0-1021.22 linux-image-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-image-oracle - 6.8.0-1021.22 linux-image-oracle-64k - 6.8.0-1021.22 linux-image-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-image-oracle-lts-24.04 - 6.8.0-1021.22 linux-image-unsigned-6.8.0-1021-oracle - 6.8.0-1021.22 linux-image-unsigned-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-modules-6.8.0-1021-oracle - 6.8.0-1021.22 linux-modules-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-modules-extra-6.8.0-1021-oracle - 6.8.0-1021.22 linux-modules-extra-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-oracle - 6.8.0-1021.22 linux-oracle-64k - 6.8.0-1021.22 linux-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-oracle-headers-6.8.0-1021 - 6.8.0-1021.22 linux-oracle-lts-24.04 - 6.8.0-1021.22 linux-oracle-tools-6.8.0-1021 - 6.8.0-1021.22 linux-tools-6.8.0-1021-oracle - 6.8.0-1021.22 linux-tools-6.8.0-1021-oracle-64k - 6.8.0-1021.22 linux-tools-oracle - 6.8.0-1021.22 linux-tools-oracle-64k - 6.8.0-1021.22 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1021.22 linux-tools-oracle-lts-24.04 - 6.8.0-1021.22 No subscription required linux-aws - 6.8.0-1024.26 linux-aws-cloud-tools-6.8.0-1024 - 6.8.0-1024.26 linux-aws-headers-6.8.0-1024 - 6.8.0-1024.26 linux-aws-lts-24.04 - 6.8.0-1024.26 linux-aws-tools-6.8.0-1024 - 6.8.0-1024.26 linux-buildinfo-6.8.0-1024-aws - 6.8.0-1024.26 linux-cloud-tools-6.8.0-1024-aws - 6.8.0-1024.26 linux-headers-6.8.0-1024-aws - 6.8.0-1024.26 linux-headers-aws - 6.8.0-1024.26 linux-headers-aws-lts-24.04 - 6.8.0-1024.26 linux-image-6.8.0-1024-aws - 6.8.0-1024.26 linux-image-aws - 6.8.0-1024.26 linux-image-aws-lts-24.04 - 6.8.0-1024.26 linux-image-unsigned-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-extra-6.8.0-1024-aws - 6.8.0-1024.26 linux-modules-extra-aws - 6.8.0-1024.26 linux-modules-extra-aws-lts-24.04 - 6.8.0-1024.26 linux-tools-6.8.0-1024-aws - 6.8.0-1024.26 linux-tools-aws - 6.8.0-1024.26 linux-tools-aws-lts-24.04 - 6.8.0-1024.26 No subscription required High CVE-2024-53104 CVE-2025-0927 USN-7325-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-buildinfo-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-cloud-tools-nvidia - 6.8.0-1023.26 linux-headers-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-headers-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-headers-nvidia - 6.8.0-1023.26 linux-headers-nvidia-64k - 6.8.0-1023.26 linux-image-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-image-nvidia - 6.8.0-1023.26 linux-image-nvidia-64k - 6.8.0-1023.26 linux-image-uc-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-uc-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-image-unsigned-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-image-unsigned-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-extra-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-modules-nvidia-fs-nvidia - 6.8.0-1023.26 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1023.26 linux-nvidia - 6.8.0-1023.26 linux-nvidia-64k - 6.8.0-1023.26 linux-nvidia-headers-6.8.0-1023 - 6.8.0-1023.26 linux-nvidia-tools-6.8.0-1023 - 6.8.0-1023.26 linux-tools-6.8.0-1023-nvidia - 6.8.0-1023.26 linux-tools-6.8.0-1023-nvidia-64k - 6.8.0-1023.26 linux-tools-nvidia - 6.8.0-1023.26 linux-tools-nvidia-64k - 6.8.0-1023.26 No subscription required High CVE-2024-53104 CVE-2025-0927 USN-7325-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; (CVE-2024-53104) Update Instructions: Run `sudo pro fix USN-7325-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-buildinfo-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-headers-nvidia-lowlatency - 6.8.0-1023.26.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-uc-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-uc-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-image-unsigned-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-image-unsigned-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-extra-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1023.26.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-nvidia-lowlatency - 6.8.0-1023.26.1 linux-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-nvidia-lowlatency-headers-6.8.0-1023 - 6.8.0-1023.26.1 linux-nvidia-lowlatency-tools-6.8.0-1023 - 6.8.0-1023.26.1 linux-tools-6.8.0-1023-nvidia-lowlatency - 6.8.0-1023.26.1 linux-tools-6.8.0-1023-nvidia-lowlatency-64k - 6.8.0-1023.26.1 linux-tools-nvidia-lowlatency - 6.8.0-1023.26.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1023.26.1 No subscription required High CVE-2024-53104 CVE-2025-0927 USN-7326-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; - Network drivers; (CVE-2024-50274, CVE-2024-53104, CVE-2024-53064) Update Instructions: Run `sudo pro fix USN-7326-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-cloud-tools-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-cloud-tools-gkeop - 6.8.0-1007.9 linux-cloud-tools-gkeop-6.8 - 6.8.0-1007.9 linux-gkeop - 6.8.0-1007.9 linux-gkeop-6.8 - 6.8.0-1007.9 linux-gkeop-cloud-tools-6.8.0-1007 - 6.8.0-1007.9 linux-gkeop-headers-6.8.0-1007 - 6.8.0-1007.9 linux-gkeop-tools-6.8.0-1007 - 6.8.0-1007.9 linux-headers-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-headers-gkeop - 6.8.0-1007.9 linux-headers-gkeop-6.8 - 6.8.0-1007.9 linux-image-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-image-gkeop - 6.8.0-1007.9 linux-image-gkeop-6.8 - 6.8.0-1007.9 linux-image-unsigned-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-extra-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-modules-extra-gkeop - 6.8.0-1007.9 linux-modules-extra-gkeop-6.8 - 6.8.0-1007.9 linux-tools-6.8.0-1007-gkeop - 6.8.0-1007.9 linux-tools-gkeop - 6.8.0-1007.9 linux-tools-gkeop-6.8 - 6.8.0-1007.9 No subscription required linux-buildinfo-6.8.0-1020-gke - 6.8.0-1020.24 linux-gke - 6.8.0-1020.24 linux-gke-headers-6.8.0-1020 - 6.8.0-1020.24 linux-gke-tools-6.8.0-1020 - 6.8.0-1020.24 linux-headers-6.8.0-1020-gke - 6.8.0-1020.24 linux-headers-gke - 6.8.0-1020.24 linux-image-6.8.0-1020-gke - 6.8.0-1020.24 linux-image-gke - 6.8.0-1020.24 linux-image-unsigned-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-extra-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-iwlwifi-6.8.0-1020-gke - 6.8.0-1020.24 linux-modules-iwlwifi-gke - 6.8.0-1020.24 linux-tools-6.8.0-1020-gke - 6.8.0-1020.24 linux-tools-gke - 6.8.0-1020.24 No subscription required linux-buildinfo-6.8.0-1025-gcp - 6.8.0-1025.27 linux-buildinfo-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-gcp - 6.8.0-1025.27 linux-gcp-64k - 6.8.0-1025.27 linux-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-gcp-headers-6.8.0-1025 - 6.8.0-1025.27 linux-gcp-lts-24.04 - 6.8.0-1025.27 linux-gcp-tools-6.8.0-1025 - 6.8.0-1025.27 linux-headers-6.8.0-1025-gcp - 6.8.0-1025.27 linux-headers-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-headers-gcp - 6.8.0-1025.27 linux-headers-gcp-64k - 6.8.0-1025.27 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-headers-gcp-lts-24.04 - 6.8.0-1025.27 linux-image-6.8.0-1025-gcp - 6.8.0-1025.27 linux-image-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-image-gcp - 6.8.0-1025.27 linux-image-gcp-64k - 6.8.0-1025.27 linux-image-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-image-gcp-lts-24.04 - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-gcp - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-6.8.0-1025-gcp - 6.8.0-1025.27 linux-modules-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-gcp - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-modules-extra-gcp - 6.8.0-1025.27 linux-modules-extra-gcp-64k - 6.8.0-1025.27 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1025.27 linux-tools-6.8.0-1025-gcp - 6.8.0-1025.27 linux-tools-6.8.0-1025-gcp-64k - 6.8.0-1025.27 linux-tools-gcp - 6.8.0-1025.27 linux-tools-gcp-64k - 6.8.0-1025.27 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1025.27 linux-tools-gcp-lts-24.04 - 6.8.0-1025.27 No subscription required High CVE-2024-50274 CVE-2024-53064 CVE-2024-53104 CVE-2025-0927 USN-7335-1 -- Django vulnerability Ubuntu 24.04 LTS It was discovered that Django incorrectly handled text wrapping. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7335-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.6 python3-django - 3:4.2.11-1ubuntu1.6 No subscription required Medium CVE-2025-26699 USN-7336-1 -- GNU Chess vulnerability Ubuntu 24.04 LTS Michael Vaughan discovered an overflow vulnerability in GNU Chess that occurs when reading a specially crafted Portable Game Notation (PGN) file. An attacker could possibly use this issue to cause GNU Chess to crash, resulting in a denial of service, or the execution of arbitrary code. Update Instructions: Run `sudo pro fix USN-7336-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnuchess - 6.2.7-1+deb11u1build0.24.04.1 No subscription required Medium CVE-2021-30184 USN-7337-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly handled Office URI Schemes. If a user or automated system were tricked into opening a specially crafted LibreOffice file, a remote attacker could possibly use this issue to call internal macros. Update Instructions: Run `sudo pro fix USN-7337-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.3 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.3 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.3 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.3 libjuh-java - 4:24.2.7-0ubuntu0.24.04.3 libjurt-java - 4:24.2.7-0ubuntu0.24.04.3 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.3 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.3 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.3 libreoffice - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.3 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.3 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.3 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.3 libridl-java - 4:24.2.7-0ubuntu0.24.04.3 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.3 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.3 libunoil-java - 4:24.2.7-0ubuntu0.24.04.3 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.3 python3-access2base - 4:24.2.7-0ubuntu0.24.04.3 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.3 python3-uno - 4:24.2.7-0ubuntu0.24.04.3 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.3 ure - 4:24.2.7-0ubuntu0.24.04.3 ure-java - 4:24.2.7-0ubuntu0.24.04.3 No subscription required Medium CVE-2025-1080 USN-7341-1 -- FreeRDP vulnerabilities Ubuntu 24.04 LTS Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-32039, CVE-2024-32040, CVE-2024-32041) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32458, CVE-2024-32460) It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32661) Update Instructions: Run `sudo pro fix USN-7341-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-shadow-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-wayland - 2.11.5+dfsg1-1ubuntu0.1~esm1 freerdp2-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-client2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-server2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-shadow-subsystem2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp-shadow2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libfreerdp2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libuwac0-0t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libuwac0-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr-tools2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm1 libwinpr2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm1 winpr-utils - 2.11.5+dfsg1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-32039 CVE-2024-32040 CVE-2024-32041 CVE-2024-32460 CVE-2024-32658 CVE-2024-32661 USN-7343-1 -- Jinja2 vulnerabilities Ubuntu 24.04 LTS Rafal Krupinski discovered that Jinja2 did not properly restrict the execution of code in situations where templates are used maliciously. An attacker with control over a template's filename and content could potentially use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2024-56201) It was discovered that Jinja2 sandboxed environments could be escaped through a call to a string format method. An attacker could possibly use this issue to enable the execution of arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2024-56326) It was discovered that Jinja2 sandboxed environments could be escaped through the malicious use of certain filters. An attacker could possibly use this issue to enable the execution of arbitrary code. (CVE-2025-27516) Update Instructions: Run `sudo pro fix USN-7343-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.3 python3-jinja2 - 3.1.2-1ubuntu1.3 No subscription required Medium CVE-2024-56201 CVE-2024-56326 CVE-2025-27516 USN-7345-1 -- .NET vulnerability Ubuntu 24.04 LTS Zahid TOKAT discovered that .NET suffered from a weak authentication vulnerability. An attacker could possibly use this issue to elevate privileges. Update Instructions: Run `sudo pro fix USN-7345-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.114-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.114-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.114-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.114-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.114-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.114-8.0.14-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.14-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.14-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.14-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.14-0ubuntu1~24.04.1 No subscription required Medium CVE-2025-24070 USN-7346-1 -- OpenSC vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a use-after-free vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-42780) It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a stack buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-42782) It was discovered that OpenSC did not correctly handle the length of certain buffers, which could lead to a out-of-bounds access vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-2977) Deepanjan Pal discovered that OpenSC did not correctly authenticate a zero length PIN. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-40660) It was discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to compromise key generation, certificate loading and other card management operations. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-40661) Hubert Kario, Michal Shagam and Eyal Ronen discovered that OpenSC had a timing side-channel and incorrectly handled RSA padding. An attacker could possibly use this issue to recover sensitive information. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-5992) Matteo Marini discovered that OpenSC did not properly manage memory due to certain uninitialized variables. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45615) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45616, CVE-2024-45617) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. (CVE-2024-45618, CVE-2024-45620) Matteo Marini discovered that OpenSC did not correctly handle certain memory operations. A physically proximate attacker could possibly use this issue to gain unauthorized access to certain systems. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45619) It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a buffer overflow. A physically proximate attacker could possibly use this issue to compromise card management operations during enrollment and modification. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-8443) Update Instructions: Run `sudo pro fix USN-7346-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: opensc - 0.25.0~rc1-1ubuntu0.1~esm1 opensc-pkcs11 - 0.25.0~rc1-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-42780 CVE-2021-42782 CVE-2023-2977 CVE-2023-40660 CVE-2023-40661 CVE-2023-5992 CVE-2024-45615 CVE-2024-45616 CVE-2024-45617 CVE-2024-45618 CVE-2024-45619 CVE-2024-45620 CVE-2024-8443 USN-7347-1 -- Netatalk vulnerabilities Ubuntu 24.04 LTS It was discovered that Netatalk did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-38439, CVE-2024-38440, CVE-2024-38441) Update Instructions: Run `sudo pro fix USN-7347-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netatalk - 3.1.18~ds-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-38439 CVE-2024-38440 CVE-2024-38441 USN-7351-1 -- RESTEasy vulnerabilities Ubuntu 24.04 LTS Nikos Papadopoulos discovered that RESTEasy improperly handled URL encoding when certain errors occur. An attacker could possibly use this issue to modify the app's behavior for other users through the network. (CVE-2020-10688) Mirko Selber discovered that RESTEasy improperly validated user input during HTTP response construction. This issue could possibly allow an attacker to cause a denial of service or execute arbitrary code. (CVE-2020-1695) It was discovered that RESTEasy unintentionally disclosed potentially sensitive server information to users during the handling of certain errors. (CVE-2020-25633) It was discovered that RESTEasy unintentionally disclosed parts of its code to users during the handling of certain errors. (CVE-2021-20289) It was discovered that RESTEasy used improper permissions when creating temporary files. An attacker could possibly use this issue to get access to sensitive data. (CVE-2023-0482) It was discovered that RESTEasy improperly handled certain HTTP requests and could be forced into a state in which it can no longer accept incoming connections. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-9622) Update Instructions: Run `sudo pro fix USN-7351-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libresteasy-java - 3.6.2-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2020-10688 CVE-2020-1695 CVE-2020-25633 CVE-2021-20289 CVE-2023-0482 CVE-2024-9622 USN-7353-1 -- PlantUML vulnerability Ubuntu 24.04 LTS Tobias S. Fink discovered that PlantUML was susceptible to cross-site scripting attacks (XSS) in instances where SVG images were rendered. An attacker could possibly use this issue to cause PlantUML to crash, resulting in a denial of service, or the execution of arbitrary code. Update Instructions: Run `sudo pro fix USN-7353-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plantuml - 1:1.2020.2+ds-3ubuntu1.1 No subscription required Medium CVE-2022-1231 USN-7354-1 -- djoser vulnerability Ubuntu 24.04 LTS Diego Cebrián discovered that djoser did not properly handle user authentication. An attacker with valid credentials could possibly use this to bypass authentication checks, such as two-factor authentication, to gain unintended access. Update Instructions: Run `sudo pro fix USN-7354-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-djoser - 2.1.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-21543 USN-7355-1 -- RestrictedPython vulnerabilities Ubuntu 24.04 LTS Nakul Choudhary and Robert Xiao discovered that RestrictedPython did not properly sanitize certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-37271) Abhishek Govindarasu, Ankush Menat and Ward Theunisse discovered that RestrictedPython did not correctly handle certain format strings. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-41039) It was discovered that RestrictedPython did not correctly restrict access to certain fields. An attacker could possibly use this issue to leak sensitive information. (CVE-2024-47532) It was discovered that RestrictedPython contained a type confusion vulnerability. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-22153) Update Instructions: Run `sudo pro fix USN-7355-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-restrictedpython - 6.2-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-37271 CVE-2023-41039 CVE-2024-47532 CVE-2025-22153 USN-7356-1 -- uriparser vulnerabilities Ubuntu 24.04 LTS It was discovered that uriparser did not correctly handle certain inputs, which could lead to an integer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-34402, CVE-2024-34403) Update Instructions: Run `sudo pro fix USN-7356-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liburiparser-dev - 0.9.7+dfsg-2ubuntu0.1~esm1 liburiparser-doc - 0.9.7+dfsg-2ubuntu0.1~esm1 liburiparser1 - 0.9.7+dfsg-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-34402 CVE-2024-34403 USN-7357-1 -- Libxslt vulnerability Ubuntu 24.04 LTS Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7357-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.39-0exp1ubuntu0.24.04.1 libxslt1.1 - 1.1.39-0exp1ubuntu0.24.04.1 xsltproc - 1.1.39-0exp1ubuntu0.24.04.1 No subscription required Medium CVE-2024-55549 USN-7359-1 -- Valkey vulnerabilities Ubuntu 24.04 LTS It was discovered that Valkey did not properly handle memory cleanup. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-46981) It was discovered that Valkey did not properly handle resource access permissions. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-51741) Update Instructions: Run `sudo pro fix USN-7359-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: valkey-redis-compat - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-sentinel - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-server - 7.2.8+dfsg1-0ubuntu0.24.04.2 valkey-tools - 7.2.8+dfsg1-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-46981 CVE-2024-51741 USN-7361-1 -- Libxslt vulnerability Ubuntu 24.04 LTS Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7361-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.39-0exp1ubuntu0.24.04.2 libxslt1.1 - 1.1.39-0exp1ubuntu0.24.04.2 xsltproc - 1.1.39-0exp1ubuntu0.24.04.2 No subscription required Medium CVE-2025-24855 USN-7362-1 -- go-gh vulnerability Ubuntu 24.04 LTS It was discovered that go-gh incorrectly handled authentication tokens. An attacker could possibly use this issue to leak authentication tokens to the wrong host. (CVE-2024-53859) Update Instructions: Run `sudo pro fix USN-7362-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-cli-go-gh-v2-dev - 2.6.0-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-53859 USN-7363-1 -- PAM-PKCS#11 vulnerabilities Ubuntu 24.04 LTS Marcus Rückert and Matthias Gerstner discovered that PAM-PKCS#11 did not properly handle certain return codes when authentication was not possible. An attacker could possibly use this issue to bypass authentication. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-24531) It was discovered that PAM-PKCS#11 did not require a private key signature for authentication by default. An attacker could possibly use this issue to bypass authentication. (CVE-2025-24032) Update Instructions: Run `sudo pro fix USN-7363-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpam-pkcs11 - 0.6.12-2ubuntu0.24.04.1 No subscription required High CVE-2025-24032 CVE-2025-24531 USN-7364-1 -- OpenSAML vulnerability Ubuntu 24.04 LTS Alexander Tan discovered that the OpenSAML C++ library was susceptible to forging of signed SAML messages. An attacker could possibly use this issue to gain unauthorized access to a system and manipulate sensitive information. Update Instructions: Run `sudo pro fix USN-7364-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsaml-dev - 3.2.1-4.1ubuntu0.24.04.1 libsaml-doc - 3.2.1-4.1ubuntu0.24.04.1 libsaml12t64 - 3.2.1-4.1ubuntu0.24.04.1 opensaml-schemas - 3.2.1-4.1ubuntu0.24.04.1 opensaml-tools - 3.2.1-4.1ubuntu0.24.04.1 No subscription required None https://launchpad.net/bugs/2103420 USN-7366-1 -- Rack vulnerabilities Ubuntu 24.04 LTS Nhật Thái Đỗ discovered that Rack incorrectly handled certain usernames. A remote attacker could possibly use this issue to perform CRLF injection. (CVE-2025-25184) Phạm Quang Minh discovered that Rack incorrectly handled certain headers. A remote attacker could possibly use this issue to perform log injection. (CVE-2025-27111) Phạm Quang Minh discovered that Rack did not properly handle relative file paths. A remote attacker could potentially exploit this to include local files that should have been inaccessible. (CVE-2025-27610) Update Instructions: Run `sudo pro fix USN-7366-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.2 No subscription required Medium CVE-2025-25184 CVE-2025-27111 CVE-2025-27610 USN-7367-1 -- zvbi vulnerabilities Ubuntu 24.04 LTS It was discovered that zvbi incorrectly handled memory when processing user input. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7367-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libzvbi-common - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi-dev - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi-doc - 0.2.42-2ubuntu0.24.04.1~esm1 libzvbi0t64 - 0.2.42-2ubuntu0.24.04.1~esm1 zvbi - 0.2.42-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2025-2173 CVE-2025-2174 CVE-2025-2175 CVE-2025-2176 CVE-2025-2177 USN-7369-1 -- elfutils vulnerabilities Ubuntu 24.04 LTS It was discovered that readelf from elfutils could be made to read out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-25260) It was discovered that readelf from elfutils could be made to write out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1371) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. (CVE-2025-1372) It was discovered that strip from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running strip on a specially crafted file, an attacker could cause strip to crash, resulting in a denial of service. (CVE-2025-1377) Update Instructions: Run `sudo pro fix USN-7369-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: debuginfod - 0.190-1.1ubuntu0.1 elfutils - 0.190-1.1ubuntu0.1 libasm-dev - 0.190-1.1ubuntu0.1 libasm1t64 - 0.190-1.1ubuntu0.1 libdebuginfod-common - 0.190-1.1ubuntu0.1 libdebuginfod-dev - 0.190-1.1ubuntu0.1 libdebuginfod1t64 - 0.190-1.1ubuntu0.1 libdw-dev - 0.190-1.1ubuntu0.1 libdw1t64 - 0.190-1.1ubuntu0.1 libelf-dev - 0.190-1.1ubuntu0.1 libelf1t64 - 0.190-1.1ubuntu0.1 No subscription required Medium CVE-2024-25260 CVE-2025-1365 CVE-2025-1371 CVE-2025-1372 CVE-2025-1377 USN-7370-1 -- SmartDNS vulnerabilities Ubuntu 24.04 LTS It was discovered that SmartDNS did not correctly align certain objects in memory, leading to undefined behaviour. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2024-24198, CVE-2024-24199) It was discovered that SmartDNS did not correctly handle certain inputs, which could lead to an integer overflow. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-42643) Update Instructions: Run `sudo pro fix USN-7370-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smartdns - 45+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-24198 CVE-2024-24199 CVE-2024-42643 USN-7371-1 -- FreeRDP vulnerabilities Ubuntu 24.04 LTS Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32458) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause FreeRDP clients and servers to crash, resulting in a denial of service. (CVE-2024-32459) It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32659, CVE-2024-32660) Update Instructions: Run `sudo pro fix USN-7371-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-shadow-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-wayland - 2.11.5+dfsg1-1ubuntu0.1~esm2 freerdp2-x11 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-client2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-server2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-shadow-subsystem2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp-shadow2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libfreerdp2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libuwac0-0t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libuwac0-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr-tools2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr2-2t64 - 2.11.5+dfsg1-1ubuntu0.1~esm2 libwinpr2-dev - 2.11.5+dfsg1-1ubuntu0.1~esm2 winpr-utils - 2.11.5+dfsg1-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Low CVE-2024-32458 CVE-2024-32459 CVE-2024-32659 CVE-2024-32660 USN-7373-1 -- Exim vulnerability Ubuntu 24.04 LTS It was discovered that Exim incorrectly handled certain memory operations. A remote attacker could use this issue to cause Exim to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7373-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.3 exim4-base - 4.97-4ubuntu4.3 exim4-config - 4.97-4ubuntu4.3 exim4-daemon-heavy - 4.97-4ubuntu4.3 exim4-daemon-light - 4.97-4ubuntu4.3 exim4-dev - 4.97-4ubuntu4.3 eximon4 - 4.97-4ubuntu4.3 No subscription required Medium CVE-2025-30232 USN-7374-1 -- containerd vulnerability Ubuntu 24.04 LTS Benjamin Koltermann discovered that containerd incorrectly handled large user id values. This could result in containers possibly being run as root, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7374-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-containerd-containerd-dev - 1.6.24~ds1-1ubuntu1.2+esm1 No subscription required containerd - 1.7.24-0ubuntu1~24.04.2 No subscription required Medium CVE-2024-40635 USN-7375-1 -- Org Mode vulnerabilities Ubuntu 24.04 LTS It was discovered that Org Mode did not correctly handle filenames containing shell metacharacters. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Org Mode could run untrusted code left in its buffer. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-30202) It was discovered that Org Mode did not correctly handle the contents of remote files. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-30205) It was discovered that Org Mode could be made to run arbitrary Elisp code. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7375-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: elpa-org - 9.6.10+dfsg-1ubuntu0.1~esm1 org-mode - 9.6.10+dfsg-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-28617 CVE-2024-30202 CVE-2024-30205 CVE-2024-39331 USN-7376-2 -- MariaDB vulnerability Ubuntu 24.04 LTS USN-7376-1 fixed vulnerabilities in MariaDB. This update provides the corresponding updates for Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. Original advisory details: A security issue was discovered in MariaDB and this update includes a new upstream MariaDB version to fix the issue. In addition to security fixes, the updated packages contain bug and regression fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-7376-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmariadb-dev - 1:10.11.11-0ubuntu0.24.04.2 libmariadb-dev-compat - 1:10.11.11-0ubuntu0.24.04.2 libmariadb3 - 1:10.11.11-0ubuntu0.24.04.2 libmariadbd-dev - 1:10.11.11-0ubuntu0.24.04.2 libmariadbd19t64 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-backup - 1:10.11.11-0ubuntu0.24.04.2 mariadb-client - 1:10.11.11-0ubuntu0.24.04.2 mariadb-client-core - 1:10.11.11-0ubuntu0.24.04.2 mariadb-common - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-connect - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-cracklib-password-check - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-gssapi-client - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-gssapi-server - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-hashicorp-key-management - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-mroonga - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-oqgraph - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-bzip2 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lz4 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lzma - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-lzo - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-provider-snappy - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-rocksdb - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-s3 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-plugin-spider - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server-10.5 - 1:10.11.11-0ubuntu0.24.04.2 mariadb-server-core - 1:10.11.11-0ubuntu0.24.04.2 mariadb-test - 1:10.11.11-0ubuntu0.24.04.2 mariadb-test-data - 1:10.11.11-0ubuntu0.24.04.2 No subscription required Medium CVE-2025-21490 USN-7377-1 -- Smarty vulnerability Ubuntu 24.04 LTS It was discovered that Smarty did not properly sanitize template file names. An attacker could possibly use this issue to cause Smarty to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7377-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: smarty4 - 4.3.1-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-35226 USN-7378-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly serialized DollarBlend in certain fonts. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27830) It was discovered that Ghostscript incorrectly handled the DOCXWRITE TXTWRITE device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27831) It was discovered that Ghostscript incorrectly handled the NPDL device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27832) It was discovered that Ghostscript incorrectly handled certain long TTF file names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-27833) It was discovered that Ghostscript incorrectly handled oversized Type 4 functions in certain PDF documents. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27834) It was discovered that Ghostscript incorrectly handled converting certain glyphs to Unicode. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27835) It was discovered that Ghostscript incorrectly handled the BJ10V device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27836) Update Instructions: Run `sudo pro fix USN-7378-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.5 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.5 libgs-common - 10.02.1~dfsg1-0ubuntu7.5 libgs-dev - 10.02.1~dfsg1-0ubuntu7.5 libgs10 - 10.02.1~dfsg1-0ubuntu7.5 libgs10-common - 10.02.1~dfsg1-0ubuntu7.5 No subscription required Medium CVE-2025-27830 CVE-2025-27831 CVE-2025-27832 CVE-2025-27833 CVE-2025-27834 CVE-2025-27835 CVE-2025-27836 USN-7379-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-57921, CVE-2024-56614, CVE-2024-56558, CVE-2024-56589, CVE-2024-56662, CVE-2024-56610, CVE-2024-56717, CVE-2024-57890, CVE-2024-55639, CVE-2024-56562, CVE-2025-21633, CVE-2024-56598, CVE-2024-47794, CVE-2024-41935, CVE-2024-57901, CVE-2024-56587, CVE-2024-56581, CVE-2024-56783, CVE-2024-57888, CVE-2024-57809, CVE-2024-57926, CVE-2025-21650, CVE-2024-56634, CVE-2025-21639, CVE-2025-21656, CVE-2024-56578, CVE-2025-21632, CVE-2024-56784, CVE-2025-21644, CVE-2024-56776, CVE-2024-56764, CVE-2024-56652, CVE-2024-56550, CVE-2024-56569, CVE-2024-57904, CVE-2024-49569, CVE-2024-56770, CVE-2024-56606, CVE-2024-57806, CVE-2024-56646, CVE-2024-57895, CVE-2024-57880, CVE-2024-56650, CVE-2024-56591, CVE-2024-56590, CVE-2024-56642, CVE-2024-56713, CVE-2025-21663, CVE-2024-57938, CVE-2024-56760, CVE-2024-56583, CVE-2025-21662, CVE-2024-56629, CVE-2024-47408, CVE-2024-57850, CVE-2024-56777, CVE-2024-56626, CVE-2024-56773, CVE-2024-56647, CVE-2025-21664, CVE-2024-56564, CVE-2024-56597, CVE-2024-56623, CVE-2024-57897, CVE-2024-56670, CVE-2024-56567, CVE-2024-57931, CVE-2024-56761, CVE-2024-57935, CVE-2024-53690, CVE-2025-21640, CVE-2024-56608, CVE-2024-57878, CVE-2025-21648, CVE-2024-57898, CVE-2024-57889, CVE-2024-56644, CVE-2024-56763, CVE-2024-57900, CVE-2024-56575, CVE-2024-56786, CVE-2025-21635, CVE-2024-56559, CVE-2024-56659, CVE-2024-56621, CVE-2024-57908, CVE-2024-52319, CVE-2024-43098, CVE-2024-57838, CVE-2024-56782, CVE-2025-21631, CVE-2024-36476, CVE-2025-21649, CVE-2024-56667, CVE-2024-49571, CVE-2024-55916, CVE-2024-57887, CVE-2024-56640, CVE-2024-57801, CVE-2024-57886, CVE-2024-56582, CVE-2024-56561, CVE-2024-56665, CVE-2024-57805, CVE-2024-51729, CVE-2024-57857, CVE-2024-57876, CVE-2024-57896, CVE-2024-57799, CVE-2024-57925, CVE-2024-57917, CVE-2024-56664, CVE-2024-57913, CVE-2025-21660, CVE-2024-56596, CVE-2024-56671, CVE-2024-56595, CVE-2024-56781, CVE-2024-57912, CVE-2024-56638, CVE-2024-56636, CVE-2024-56669, CVE-2024-57945, CVE-2024-56633, CVE-2024-56605, CVE-2024-57882, CVE-2025-21652, CVE-2024-53179, CVE-2024-56599, CVE-2024-57892, CVE-2025-21647, CVE-2024-57910, CVE-2024-57792, CVE-2024-56768, CVE-2024-56711, CVE-2024-47143, CVE-2024-56577, CVE-2024-56574, CVE-2024-56765, CVE-2024-58087, CVE-2024-53685, CVE-2024-56787, CVE-2024-56592, CVE-2024-56368, CVE-2024-56615, CVE-2024-56712, CVE-2024-56648, CVE-2024-57874, CVE-2024-56653, CVE-2024-56656, CVE-2024-56641, CVE-2024-56719, CVE-2025-21658, CVE-2024-56637, CVE-2024-56709, CVE-2024-57843, CVE-2024-56588, CVE-2024-57807, CVE-2024-57939, CVE-2024-56594, CVE-2024-55642, CVE-2024-57841, CVE-2024-50051, CVE-2024-56663, CVE-2024-56654, CVE-2024-56369, CVE-2024-57885, CVE-2024-56779, CVE-2024-56772, CVE-2024-56617, CVE-2024-56624, CVE-2024-56570, CVE-2024-56639, CVE-2025-21642, CVE-2024-56603, CVE-2024-56604, CVE-2024-57875, CVE-2025-21653, CVE-2025-21654, CVE-2024-56645, CVE-2024-56775, CVE-2024-52332, CVE-2024-48875, CVE-2024-41932, CVE-2024-57804, CVE-2025-21661, CVE-2024-57932, CVE-2024-53681, CVE-2024-56563, CVE-2024-56609, CVE-2024-57798, CVE-2025-21637, CVE-2024-57940, CVE-2024-56675, CVE-2024-56630, CVE-2024-56565, CVE-2024-54460, CVE-2024-56573, CVE-2025-21645, CVE-2024-56715, CVE-2024-56632, CVE-2024-56622, CVE-2024-56673, CVE-2024-48881, CVE-2024-56593, CVE-2024-56620, CVE-2024-48876, CVE-2025-21643, CVE-2024-56657, CVE-2024-57905, CVE-2024-57802, CVE-2024-56766, CVE-2024-57893, CVE-2024-57894, CVE-2024-57903, CVE-2024-57902, CVE-2024-57934, CVE-2024-57881, CVE-2024-56602, CVE-2024-47809, CVE-2024-56580, CVE-2024-57899, CVE-2024-56759, CVE-2024-56586, CVE-2024-57839, CVE-2024-49568, CVE-2024-56660, CVE-2024-53687, CVE-2024-57907, CVE-2024-56601, CVE-2024-56767, CVE-2024-57916, CVE-2024-56616, CVE-2024-56557, CVE-2024-56566, CVE-2024-56643, CVE-2025-21638, CVE-2024-57879, CVE-2025-21655, CVE-2024-56618, CVE-2024-56758, CVE-2024-56576, CVE-2024-57849, CVE-2024-56372, CVE-2024-45828, CVE-2024-57795, CVE-2024-56710, CVE-2024-56568, CVE-2024-56769, CVE-2025-21834, CVE-2024-56716, CVE-2024-56613, CVE-2024-56584, CVE-2024-56552, CVE-2025-21659, CVE-2024-57929, CVE-2024-57946, CVE-2025-21646, CVE-2024-56572, CVE-2024-55881, CVE-2025-21651, CVE-2024-57924, CVE-2025-21634, CVE-2024-53682, CVE-2024-57872, CVE-2024-53680, CVE-2024-54680, CVE-2024-57918, CVE-2024-56780, CVE-2025-21636, CVE-2024-57906, CVE-2024-55641, CVE-2024-54455, CVE-2024-57919, CVE-2024-54683, CVE-2024-54193, CVE-2024-56635, CVE-2024-57933, CVE-2024-56611, CVE-2024-56551, CVE-2024-57883, CVE-2024-57793, CVE-2024-56631, CVE-2024-56600, CVE-2024-56651, CVE-2024-56714, CVE-2024-39282, CVE-2024-56627, CVE-2024-56649, CVE-2024-56579, CVE-2024-57791, CVE-2024-56774, CVE-2024-57944, CVE-2024-57911, CVE-2024-48873, CVE-2024-57884, CVE-2025-21629, CVE-2024-56778, CVE-2024-56619, CVE-2024-54191, CVE-2024-56771, CVE-2024-47141, CVE-2024-56757, CVE-2024-56718, CVE-2024-56655, CVE-2024-56607, CVE-2024-56785, CVE-2024-56625) Update Instructions: Run `sudo pro fix USN-7379-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-buildinfo-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-cloud-tools-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-headers-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-hwe-6.11-headers-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-hwe-6.11-tools-6.11.0-21 - 6.11.0-21.21~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-image-unsigned-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-image-unsigned-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-modules-extra-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu6-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-ipu7-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-usbio-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-modules-vision-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-6.11.0-21-generic - 6.11.0-21.21~24.04.1 linux-tools-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-21.21~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-21.21~24.04.1 No subscription required linux-image-6.11.0-21-generic - 6.11.0-21.21~24.04.1+1 linux-image-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1+1 linux-image-uc-6.11.0-21-generic - 6.11.0-21.21~24.04.1+1 linux-image-uc-6.11.0-21-generic-64k - 6.11.0-21.21~24.04.1+1 No subscription required High CVE-2024-36476 CVE-2024-39282 CVE-2024-41932 CVE-2024-41935 CVE-2024-43098 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47408 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49568 CVE-2024-49569 CVE-2024-49571 CVE-2024-50051 CVE-2024-51729 CVE-2024-52319 CVE-2024-52332 CVE-2024-53179 CVE-2024-53680 CVE-2024-53681 CVE-2024-53682 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54191 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55641 CVE-2024-55642 CVE-2024-55881 CVE-2024-55916 CVE-2024-56368 CVE-2024-56369 CVE-2024-56372 CVE-2024-56550 CVE-2024-56551 CVE-2024-56552 CVE-2024-56557 CVE-2024-56558 CVE-2024-56559 CVE-2024-56561 CVE-2024-56562 CVE-2024-56563 CVE-2024-56564 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56591 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56617 CVE-2024-56618 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56624 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56639 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56646 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56655 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56669 CVE-2024-56670 CVE-2024-56671 CVE-2024-56673 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56711 CVE-2024-56712 CVE-2024-56713 CVE-2024-56714 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56719 CVE-2024-56757 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56765 CVE-2024-56766 CVE-2024-56767 CVE-2024-56768 CVE-2024-56769 CVE-2024-56770 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56784 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57795 CVE-2024-57798 CVE-2024-57799 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57809 CVE-2024-57838 CVE-2024-57839 CVE-2024-57841 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57857 CVE-2024-57872 CVE-2024-57874 CVE-2024-57875 CVE-2024-57876 CVE-2024-57878 CVE-2024-57879 CVE-2024-57880 CVE-2024-57881 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57886 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57905 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57918 CVE-2024-57919 CVE-2024-57921 CVE-2024-57924 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57934 CVE-2024-57935 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57944 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2025-21629 CVE-2025-21631 CVE-2025-21632 CVE-2025-21633 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21644 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21661 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21834 USN-7381-1 -- Linux kernel (Low Latency) vulnerabilities Ubuntu 24.04 LTS Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Network namespace; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-56712, CVE-2024-56761, CVE-2025-21661, CVE-2024-56565, CVE-2024-57804, CVE-2024-57887, CVE-2025-21642, CVE-2024-56779, CVE-2025-21656, CVE-2024-57890, CVE-2024-36476, CVE-2024-57843, CVE-2024-56594, CVE-2024-41932, CVE-2025-21653, CVE-2024-56567, CVE-2024-56665, CVE-2024-54191, CVE-2024-57893, CVE-2024-57932, CVE-2024-56656, CVE-2024-57945, CVE-2024-57931, CVE-2024-56599, CVE-2024-57897, CVE-2024-57903, CVE-2024-57918, CVE-2024-57795, CVE-2024-56662, CVE-2025-21639, CVE-2024-55881, CVE-2024-57889, CVE-2024-57884, CVE-2024-57934, CVE-2024-39282, CVE-2024-56718, CVE-2024-56644, CVE-2024-56760, CVE-2024-43098, CVE-2024-47143, CVE-2024-55642, CVE-2024-56634, CVE-2024-56564, CVE-2024-56768, CVE-2024-56649, CVE-2024-57919, CVE-2024-56620, CVE-2024-56625, CVE-2024-56655, CVE-2024-56772, CVE-2025-21637, CVE-2024-56617, CVE-2024-57879, CVE-2024-56715, CVE-2024-56550, CVE-2024-50051, CVE-2024-56673, CVE-2024-51729, CVE-2025-21664, CVE-2025-21649, CVE-2024-56605, CVE-2024-56622, CVE-2024-56591, CVE-2024-56782, CVE-2024-57801, CVE-2024-56664, CVE-2024-57916, CVE-2024-53680, CVE-2024-57926, CVE-2024-56637, CVE-2024-56769, CVE-2024-57924, CVE-2024-56648, CVE-2024-57872, CVE-2024-56593, CVE-2024-57913, CVE-2024-53682, CVE-2024-56670, CVE-2024-56767, CVE-2024-56778, CVE-2024-56777, CVE-2025-21658, CVE-2025-21646, CVE-2024-48875, CVE-2024-56758, CVE-2024-56604, CVE-2024-56787, CVE-2024-56581, CVE-2025-21635, CVE-2024-56641, CVE-2024-56608, CVE-2024-57885, CVE-2024-56716, CVE-2024-56671, CVE-2024-56559, CVE-2025-21633, CVE-2024-56372, CVE-2024-57888, CVE-2024-56623, CVE-2025-21638, CVE-2024-56600, CVE-2024-56647, CVE-2025-21659, CVE-2024-41935, CVE-2024-56624, CVE-2024-56574, CVE-2025-21648, CVE-2024-56621, CVE-2024-54460, CVE-2024-56659, CVE-2024-47141, CVE-2024-57805, CVE-2024-57792, CVE-2024-45828, CVE-2024-53681, CVE-2024-56568, CVE-2024-56764, CVE-2025-21650, CVE-2024-56601, CVE-2024-56663, CVE-2025-21660, CVE-2025-21629, CVE-2024-56595, CVE-2024-57917, CVE-2024-53685, CVE-2024-57882, CVE-2024-57894, CVE-2024-56651, CVE-2024-56657, CVE-2024-57876, CVE-2024-56717, CVE-2024-57935, CVE-2024-56667, CVE-2024-57910, CVE-2024-57793, CVE-2024-56631, CVE-2024-56638, CVE-2025-21640, CVE-2024-56710, CVE-2024-56583, CVE-2024-56557, CVE-2024-56658, CVE-2025-21632, CVE-2024-56645, CVE-2024-56646, CVE-2024-56640, CVE-2024-57944, CVE-2024-56598, CVE-2024-57857, CVE-2024-56709, CVE-2024-56654, CVE-2024-57809, CVE-2024-57895, CVE-2025-21834, CVE-2024-56763, CVE-2024-48881, CVE-2024-57841, CVE-2024-57878, CVE-2024-56774, CVE-2024-57791, CVE-2024-56575, CVE-2024-56619, CVE-2024-56570, CVE-2024-56616, CVE-2024-56569, CVE-2025-21636, CVE-2024-56572, CVE-2024-56552, CVE-2024-56596, CVE-2025-21654, CVE-2024-56573, CVE-2024-56784, CVE-2024-56626, CVE-2024-56642, CVE-2024-56643, CVE-2024-56719, CVE-2024-56632, CVE-2024-57839, CVE-2024-56578, CVE-2024-53690, CVE-2024-56609, CVE-2024-56562, CVE-2024-56589, CVE-2024-56781, CVE-2024-56672, CVE-2024-56775, CVE-2024-56713, CVE-2024-56580, CVE-2024-57874, CVE-2024-56369, CVE-2024-56711, CVE-2025-21651, CVE-2024-56584, CVE-2024-57904, CVE-2024-54680, CVE-2024-56577, CVE-2024-56558, CVE-2024-56780, CVE-2024-58087, CVE-2024-57892, CVE-2025-21644, CVE-2024-57911, CVE-2024-56579, CVE-2025-21663, CVE-2024-56618, CVE-2024-56766, CVE-2024-56653, CVE-2025-21655, CVE-2024-56669, CVE-2024-56759, CVE-2024-48876, CVE-2025-21631, CVE-2024-56765, CVE-2024-56770, CVE-2024-57838, CVE-2025-21634, CVE-2024-56650, CVE-2024-57939, CVE-2024-56606, CVE-2024-56610, CVE-2025-21662, CVE-2024-56785, CVE-2024-55916, CVE-2025-21643, CVE-2024-56586, CVE-2024-56582, CVE-2024-56614, CVE-2024-49571, CVE-2024-49569, CVE-2024-57798, CVE-2024-56633, CVE-2024-55641, CVE-2025-21647, CVE-2025-21652, CVE-2024-56757, CVE-2024-56597, CVE-2024-47794, CVE-2024-57902, CVE-2024-57925, CVE-2024-54683, CVE-2024-57938, CVE-2024-56615, CVE-2024-57906, CVE-2024-53687, CVE-2024-57899, CVE-2024-56783, CVE-2024-56786, CVE-2024-56635, CVE-2024-56551, CVE-2024-53179, CVE-2024-56588, CVE-2024-47408, CVE-2024-57849, CVE-2024-52319, CVE-2024-56576, CVE-2024-57905, CVE-2024-57946, CVE-2024-56607, CVE-2024-57806, CVE-2024-57933, CVE-2024-55639, CVE-2024-56561, CVE-2024-48873, CVE-2024-52332, CVE-2025-21645, CVE-2024-56602, CVE-2024-56590, CVE-2024-57799, CVE-2024-57929, CVE-2024-56639, CVE-2024-56613, CVE-2024-56675, CVE-2024-57912, CVE-2024-57883, CVE-2024-56636, CVE-2024-56592, CVE-2024-57802, CVE-2024-54455, CVE-2024-57908, CVE-2024-56603, CVE-2024-57875, CVE-2024-56773, CVE-2024-47809, CVE-2024-56630, CVE-2024-56587, CVE-2024-56627, CVE-2024-57921, CVE-2024-56660, CVE-2024-56771, CVE-2024-57886, CVE-2024-57896, CVE-2024-57807, CVE-2024-57907, CVE-2024-49568, CVE-2024-54193, CVE-2024-56652, CVE-2024-57940, CVE-2024-57898, CVE-2024-57901, CVE-2024-56714, CVE-2024-56566, CVE-2024-56563, CVE-2024-56368, CVE-2024-56611, CVE-2024-56776, CVE-2024-57850, CVE-2024-56629, CVE-2024-57881, CVE-2024-57880, CVE-2024-57900) Update Instructions: Run `sudo pro fix USN-7381-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-buildinfo-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-cloud-tools-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-headers-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-headers-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-image-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-image-unsigned-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-image-unsigned-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1011 - 6.11.0-1011.12~24.04.1 linux-modules-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-modules-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-tools-6.11.0-1011-lowlatency - 6.11.0-1011.12~24.04.1 linux-tools-6.11.0-1011-lowlatency-64k - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1011.12~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1011.12~24.04.1 No subscription required High CVE-2024-36476 CVE-2024-39282 CVE-2024-41932 CVE-2024-41935 CVE-2024-43098 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47408 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49568 CVE-2024-49569 CVE-2024-49571 CVE-2024-50051 CVE-2024-51729 CVE-2024-52319 CVE-2024-52332 CVE-2024-53179 CVE-2024-53680 CVE-2024-53681 CVE-2024-53682 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54191 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55641 CVE-2024-55642 CVE-2024-55881 CVE-2024-55916 CVE-2024-56368 CVE-2024-56369 CVE-2024-56372 CVE-2024-56550 CVE-2024-56551 CVE-2024-56552 CVE-2024-56557 CVE-2024-56558 CVE-2024-56559 CVE-2024-56561 CVE-2024-56562 CVE-2024-56563 CVE-2024-56564 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56591 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56617 CVE-2024-56618 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56624 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56639 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56646 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56655 CVE-2024-56656 CVE-2024-56657 CVE-2024-56658 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56669 CVE-2024-56670 CVE-2024-56671 CVE-2024-56672 CVE-2024-56673 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56711 CVE-2024-56712 CVE-2024-56713 CVE-2024-56714 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56719 CVE-2024-56757 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56765 CVE-2024-56766 CVE-2024-56767 CVE-2024-56768 CVE-2024-56769 CVE-2024-56770 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56784 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57795 CVE-2024-57798 CVE-2024-57799 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57809 CVE-2024-57838 CVE-2024-57839 CVE-2024-57841 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57857 CVE-2024-57872 CVE-2024-57874 CVE-2024-57875 CVE-2024-57876 CVE-2024-57878 CVE-2024-57879 CVE-2024-57880 CVE-2024-57881 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57886 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57905 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57918 CVE-2024-57919 CVE-2024-57921 CVE-2024-57924 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57934 CVE-2024-57935 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57944 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2025-0927 CVE-2025-21629 CVE-2025-21631 CVE-2025-21632 CVE-2025-21633 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21644 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21661 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21834 USN-7382-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - i.MX SoC drivers; - SPI subsystem; - UFS subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - File systems infrastructure; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - Overlay file system; - Diskquota system; - SMB network file system; - DRM display driver; - BPF subsystem; - VLANs driver; - KASAN memory debugging framework; - Memory management; - StackDepot library; - Bluetooth subsystem; - LAPB network protocol; - Netfilter; - io_uring subsystem; - Control group (cgroup); - DMA mapping infrastructure; - KCSAN framework; - Scheduler infrastructure; - Seccomp subsystem; - Tracing infrastructure; - Workqueue subsystem; - KUnit library; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - TIPC protocol; - Wireless networking; - eXpress Data Path; - SELinux security module; - ALSA framework; - Intel ASoC drivers; - SOF drivers; (CVE-2024-47794, CVE-2025-21653, CVE-2024-55642, CVE-2024-56580, CVE-2024-36476, CVE-2024-56623, CVE-2024-56773, CVE-2024-48873, CVE-2024-47141, CVE-2024-57910, CVE-2024-56759, CVE-2024-54460, CVE-2024-57839, CVE-2024-56625, CVE-2024-55916, CVE-2025-21664, CVE-2025-21652, CVE-2024-56624, CVE-2024-56574, CVE-2024-50051, CVE-2025-21655, CVE-2024-56578, CVE-2024-56782, CVE-2024-57939, CVE-2024-57935, CVE-2024-56647, CVE-2024-57905, CVE-2024-57921, CVE-2024-56660, CVE-2025-21650, CVE-2025-21631, CVE-2024-56642, CVE-2024-56552, CVE-2024-57934, CVE-2024-56621, CVE-2024-57881, CVE-2024-41932, CVE-2024-56770, CVE-2024-57897, CVE-2024-56785, CVE-2024-56664, CVE-2024-57945, CVE-2024-57938, CVE-2024-56636, CVE-2024-56572, CVE-2024-43098, CVE-2024-56760, CVE-2024-57916, CVE-2024-56714, CVE-2025-21660, CVE-2024-57906, CVE-2025-21638, CVE-2024-53687, CVE-2024-56652, CVE-2024-51729, CVE-2024-49571, CVE-2024-57883, CVE-2024-54191, CVE-2024-56712, CVE-2024-49568, CVE-2024-57932, CVE-2024-57893, CVE-2024-56645, CVE-2024-56719, CVE-2024-56641, CVE-2024-57802, CVE-2024-56775, CVE-2024-56627, CVE-2024-56638, CVE-2024-57929, CVE-2024-56615, CVE-2024-56566, CVE-2024-56620, CVE-2024-56577, CVE-2025-21656, CVE-2024-57887, CVE-2024-52319, CVE-2024-56657, CVE-2024-57872, CVE-2024-56607, CVE-2024-56562, CVE-2025-21645, CVE-2025-21634, CVE-2024-56567, CVE-2024-56637, CVE-2025-21646, CVE-2024-57918, CVE-2024-56646, CVE-2024-57849, CVE-2025-21633, CVE-2025-21639, CVE-2024-56644, CVE-2024-56618, CVE-2024-56564, CVE-2024-56369, CVE-2024-56766, CVE-2024-56635, CVE-2024-57907, CVE-2024-56778, CVE-2024-57880, CVE-2024-57885, CVE-2024-56591, CVE-2024-56780, CVE-2024-57913, CVE-2024-54680, CVE-2025-21632, CVE-2024-54683, CVE-2025-21654, CVE-2024-58087, CVE-2024-56772, CVE-2024-56758, CVE-2024-57795, CVE-2025-21644, CVE-2024-56586, CVE-2024-56663, CVE-2024-56558, CVE-2024-57882, CVE-2024-56651, CVE-2024-56783, CVE-2024-53681, CVE-2024-57911, CVE-2024-57879, CVE-2024-56649, CVE-2024-56563, CVE-2024-56639, CVE-2024-56605, CVE-2024-57888, CVE-2024-56640, CVE-2024-57841, CVE-2024-56656, CVE-2024-48875, CVE-2024-48876, CVE-2024-57919, CVE-2024-57940, CVE-2024-56630, CVE-2024-53685, CVE-2024-56604, CVE-2024-47809, CVE-2024-57889, CVE-2024-56619, CVE-2024-57806, CVE-2024-56583, CVE-2024-56715, CVE-2025-21640, CVE-2025-21662, CVE-2024-56662, CVE-2024-55639, CVE-2024-56711, CVE-2024-56372, CVE-2024-54455, CVE-2024-56771, CVE-2024-56368, CVE-2024-57892, CVE-2024-57843, CVE-2025-21636, CVE-2024-56650, CVE-2024-56613, CVE-2024-56716, CVE-2024-57793, CVE-2024-56634, CVE-2024-56595, CVE-2024-57878, CVE-2024-56598, CVE-2024-39282, CVE-2024-57908, CVE-2024-57917, CVE-2024-56763, CVE-2024-56629, CVE-2024-56710, CVE-2024-56671, CVE-2024-56667, CVE-2024-57924, CVE-2024-57926, CVE-2025-21658, CVE-2024-56594, CVE-2024-56584, CVE-2024-53179, CVE-2024-56587, CVE-2024-57946, CVE-2024-56717, CVE-2025-21635, CVE-2024-56779, CVE-2024-57944, CVE-2024-56767, CVE-2024-56781, CVE-2024-56765, CVE-2024-56609, CVE-2024-54193, CVE-2024-57804, CVE-2024-56599, CVE-2024-56602, CVE-2024-57901, CVE-2024-53680, CVE-2024-57801, CVE-2024-57912, CVE-2024-56606, CVE-2024-56579, CVE-2024-56588, CVE-2024-57895, CVE-2024-56601, CVE-2024-55641, CVE-2024-56559, CVE-2024-56557, CVE-2025-21661, CVE-2024-57799, CVE-2024-57850, CVE-2024-57876, CVE-2024-47408, CVE-2024-57899, CVE-2024-56597, CVE-2024-57890, CVE-2024-56670, CVE-2024-56603, CVE-2024-56654, CVE-2025-21834, CVE-2024-56590, CVE-2024-49569, CVE-2024-56616, CVE-2024-56659, CVE-2024-56596, CVE-2025-21642, CVE-2025-21663, CVE-2025-21648, CVE-2024-56614, CVE-2024-56673, CVE-2024-56787, CVE-2024-56713, CVE-2024-56573, CVE-2024-56589, CVE-2024-56764, CVE-2024-56655, CVE-2024-56617, CVE-2024-56669, CVE-2024-56576, CVE-2024-57792, CVE-2024-57904, CVE-2024-52332, CVE-2024-57900, CVE-2024-57933, CVE-2024-55881, CVE-2024-56626, CVE-2024-57894, CVE-2024-56582, CVE-2024-57838, CVE-2025-21629, CVE-2025-21659, CVE-2024-57809, CVE-2024-47143, CVE-2024-57925, CVE-2024-41935, CVE-2025-21649, CVE-2024-57884, CVE-2024-57875, CVE-2025-21647, CVE-2024-56581, CVE-2024-57886, CVE-2024-57896, CVE-2025-21651, CVE-2024-56611, CVE-2024-56575, CVE-2024-57807, CVE-2024-56561, CVE-2024-53690, CVE-2024-56761, CVE-2024-57902, CVE-2024-56600, CVE-2024-56593, CVE-2024-57805, CVE-2024-56568, CVE-2024-56632, CVE-2024-56622, CVE-2025-21637, CVE-2024-45828, CVE-2024-56709, CVE-2024-56631, CVE-2025-21643, CVE-2024-56786, CVE-2024-56565, CVE-2024-57903, CVE-2024-56592, CVE-2024-56569, CVE-2024-56718, CVE-2024-57791, CVE-2024-56665, CVE-2024-56774, CVE-2024-56608, CVE-2024-56643, CVE-2024-57931, CVE-2024-57857, CVE-2024-56777, CVE-2024-53682, CVE-2024-56648, CVE-2024-56769, CVE-2024-48881, CVE-2024-56776, CVE-2024-57798, CVE-2024-57874, CVE-2024-56633, CVE-2024-56768, CVE-2024-56653, CVE-2024-56784, CVE-2024-56550, CVE-2024-56610, CVE-2024-56570, CVE-2024-56675, CVE-2024-57898, CVE-2024-56551) Update Instructions: Run `sudo pro fix USN-7382-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1017-oem - 6.11.0-1017.17 linux-headers-6.11.0-1017-oem - 6.11.0-1017.17 linux-headers-oem-24.04b - 6.11.0-1017.17 linux-image-6.11.0-1017-oem - 6.11.0-1017.17 linux-image-oem-24.04b - 6.11.0-1017.17 linux-image-uc-6.11.0-1017-oem - 6.11.0-1017.17 linux-image-uc-oem-24.04b - 6.11.0-1017.17 linux-image-unsigned-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu6-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu6-oem-24.04b - 6.11.0-1017.17 linux-modules-ipu7-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-ipu7-oem-24.04b - 6.11.0-1017.17 linux-modules-iwlwifi-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1017.17 linux-modules-usbio-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-usbio-oem-24.04b - 6.11.0-1017.17 linux-modules-vision-6.11.0-1017-oem - 6.11.0-1017.17 linux-modules-vision-oem-24.04b - 6.11.0-1017.17 linux-oem-24.04b - 6.11.0-1017.17 linux-oem-6.11-headers-6.11.0-1017 - 6.11.0-1017.17 linux-oem-6.11-tools-6.11.0-1017 - 6.11.0-1017.17 linux-tools-6.11.0-1017-oem - 6.11.0-1017.17 linux-tools-oem-24.04b - 6.11.0-1017.17 No subscription required High CVE-2024-36476 CVE-2024-39282 CVE-2024-41932 CVE-2024-41935 CVE-2024-43098 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47408 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49568 CVE-2024-49569 CVE-2024-49571 CVE-2024-50051 CVE-2024-51729 CVE-2024-52319 CVE-2024-52332 CVE-2024-53179 CVE-2024-53680 CVE-2024-53681 CVE-2024-53682 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54191 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55641 CVE-2024-55642 CVE-2024-55881 CVE-2024-55916 CVE-2024-56368 CVE-2024-56369 CVE-2024-56372 CVE-2024-56550 CVE-2024-56551 CVE-2024-56552 CVE-2024-56557 CVE-2024-56558 CVE-2024-56559 CVE-2024-56561 CVE-2024-56562 CVE-2024-56563 CVE-2024-56564 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56591 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56617 CVE-2024-56618 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56624 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56639 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56646 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56655 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56669 CVE-2024-56670 CVE-2024-56671 CVE-2024-56673 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56711 CVE-2024-56712 CVE-2024-56713 CVE-2024-56714 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56719 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56765 CVE-2024-56766 CVE-2024-56767 CVE-2024-56768 CVE-2024-56769 CVE-2024-56770 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56784 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57795 CVE-2024-57798 CVE-2024-57799 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57809 CVE-2024-57838 CVE-2024-57839 CVE-2024-57841 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57857 CVE-2024-57872 CVE-2024-57874 CVE-2024-57875 CVE-2024-57876 CVE-2024-57878 CVE-2024-57879 CVE-2024-57880 CVE-2024-57881 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57886 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57905 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57918 CVE-2024-57919 CVE-2024-57921 CVE-2024-57924 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57934 CVE-2024-57935 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57944 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2025-21629 CVE-2025-21631 CVE-2025-21632 CVE-2025-21633 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21644 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21661 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21834 USN-7383-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Drivers core; - Ublk userspace block driver; - Compressed RAM block device driver; - CPU frequency scaling framework; - DAX dirext access to differentiated memory framework; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - Pin controllers subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - Framebuffer layer; - BTRFS file system; - Ext4 file system; - F2FS file system; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Network traffic control; - Network sockets; - User-space API (UAPI); - io_uring subsystem; - Kernel thread helper (kthread); - RCU subsystem; - Timer subsystem; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - Multipath TCP; - Netfilter; - Netlink; - Unix domain sockets; - Wireless networking; - eXpress Data Path; (CVE-2024-50182, CVE-2024-50020, CVE-2024-50060, CVE-2024-50074, CVE-2024-50193, CVE-2024-50117, CVE-2024-50201, CVE-2024-50033, CVE-2024-50056, CVE-2024-50026, CVE-2024-50059, CVE-2024-50041, CVE-2024-50083, CVE-2024-50038, CVE-2024-50229, CVE-2024-50028, CVE-2024-50183, CVE-2024-50196, CVE-2024-50029, CVE-2024-50093, CVE-2024-50188, CVE-2024-50025, CVE-2024-50200, CVE-2024-50068, CVE-2024-49920, CVE-2024-50198, CVE-2024-50035, CVE-2024-50042, CVE-2024-50023, CVE-2024-50047, CVE-2024-56582, CVE-2024-50090, CVE-2024-50062, CVE-2024-50073, CVE-2024-50063, CVE-2024-50098, CVE-2024-50197, CVE-2024-50040, CVE-2024-50180, CVE-2024-53170, CVE-2024-50087, CVE-2024-50031, CVE-2024-50202, CVE-2024-50058, CVE-2024-50186, CVE-2024-50134, CVE-2024-50194, CVE-2024-50075, CVE-2024-50046, CVE-2024-50078, CVE-2024-50066, CVE-2024-53156, CVE-2024-49893, CVE-2024-50021, CVE-2024-47711, CVE-2024-47726, CVE-2024-50024, CVE-2024-49865, CVE-2024-50064, CVE-2024-50049, CVE-2024-50171, CVE-2024-50019, CVE-2024-50077, CVE-2024-50199, CVE-2024-50072, CVE-2024-50069, CVE-2024-50048, CVE-2024-49972, CVE-2024-53165, CVE-2024-50022, CVE-2024-50084, CVE-2024-50185, CVE-2024-50055, CVE-2024-50187, CVE-2024-50009, CVE-2024-50082, CVE-2024-50085, CVE-2024-50095, CVE-2024-50195, CVE-2024-50080, CVE-2024-50076, CVE-2024-50088, CVE-2024-50039, CVE-2024-50044, CVE-2024-50030, CVE-2024-49968, CVE-2024-50148, CVE-2024-50192, CVE-2024-50032, CVE-2024-50061, CVE-2024-50233, CVE-2024-50099, CVE-2024-49921, CVE-2024-50184, CVE-2024-50065, CVE-2024-49914, CVE-2024-50027, CVE-2024-50070, CVE-2024-50086, CVE-2024-50189, CVE-2024-56614, CVE-2024-50057, CVE-2024-50096, CVE-2024-50045, CVE-2024-50036, CVE-2024-56663, CVE-2024-50191, CVE-2024-50101) Update Instructions: Run `sudo pro fix USN-7383-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-cloud-tools-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-cloud-tools-gkeop - 6.8.0-1008.10 linux-cloud-tools-gkeop-6.8 - 6.8.0-1008.10 linux-gkeop - 6.8.0-1008.10 linux-gkeop-6.8 - 6.8.0-1008.10 linux-gkeop-cloud-tools-6.8.0-1008 - 6.8.0-1008.10 linux-gkeop-headers-6.8.0-1008 - 6.8.0-1008.10 linux-gkeop-tools-6.8.0-1008 - 6.8.0-1008.10 linux-headers-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-headers-gkeop - 6.8.0-1008.10 linux-headers-gkeop-6.8 - 6.8.0-1008.10 linux-image-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-image-gkeop - 6.8.0-1008.10 linux-image-gkeop-6.8 - 6.8.0-1008.10 linux-image-unsigned-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-extra-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-modules-extra-gkeop - 6.8.0-1008.10 linux-modules-extra-gkeop-6.8 - 6.8.0-1008.10 linux-tools-6.8.0-1008-gkeop - 6.8.0-1008.10 linux-tools-gkeop - 6.8.0-1008.10 linux-tools-gkeop-6.8 - 6.8.0-1008.10 No subscription required linux-buildinfo-6.8.0-1021-gke - 6.8.0-1021.25 linux-gke - 6.8.0-1021.25 linux-gke-headers-6.8.0-1021 - 6.8.0-1021.25 linux-gke-tools-6.8.0-1021 - 6.8.0-1021.25 linux-headers-6.8.0-1021-gke - 6.8.0-1021.25 linux-headers-gke - 6.8.0-1021.25 linux-image-6.8.0-1021-gke - 6.8.0-1021.25 linux-image-gke - 6.8.0-1021.25 linux-image-unsigned-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-extra-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-iwlwifi-6.8.0-1021-gke - 6.8.0-1021.25 linux-modules-iwlwifi-gke - 6.8.0-1021.25 linux-tools-6.8.0-1021-gke - 6.8.0-1021.25 linux-tools-gke - 6.8.0-1021.25 No subscription required linux-buildinfo-6.8.0-1022-oracle - 6.8.0-1022.23 linux-buildinfo-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-headers-6.8.0-1022-oracle - 6.8.0-1022.23 linux-headers-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-headers-oracle - 6.8.0-1022.23 linux-headers-oracle-64k - 6.8.0-1022.23 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-headers-oracle-lts-24.04 - 6.8.0-1022.23 linux-image-6.8.0-1022-oracle - 6.8.0-1022.23 linux-image-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-image-oracle - 6.8.0-1022.23 linux-image-oracle-64k - 6.8.0-1022.23 linux-image-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-image-oracle-lts-24.04 - 6.8.0-1022.23 linux-image-unsigned-6.8.0-1022-oracle - 6.8.0-1022.23 linux-image-unsigned-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-modules-6.8.0-1022-oracle - 6.8.0-1022.23 linux-modules-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-modules-extra-6.8.0-1022-oracle - 6.8.0-1022.23 linux-modules-extra-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-oracle - 6.8.0-1022.23 linux-oracle-64k - 6.8.0-1022.23 linux-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-oracle-headers-6.8.0-1022 - 6.8.0-1022.23 linux-oracle-lts-24.04 - 6.8.0-1022.23 linux-oracle-tools-6.8.0-1022 - 6.8.0-1022.23 linux-tools-6.8.0-1022-oracle - 6.8.0-1022.23 linux-tools-6.8.0-1022-oracle-64k - 6.8.0-1022.23 linux-tools-oracle - 6.8.0-1022.23 linux-tools-oracle-64k - 6.8.0-1022.23 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1022.23 linux-tools-oracle-lts-24.04 - 6.8.0-1022.23 No subscription required linux-buildinfo-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-buildinfo-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-cloud-tools-nvidia - 6.8.0-1024.27 linux-headers-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-headers-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-headers-nvidia - 6.8.0-1024.27 linux-headers-nvidia-64k - 6.8.0-1024.27 linux-image-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-image-nvidia - 6.8.0-1024.27 linux-image-nvidia-64k - 6.8.0-1024.27 linux-image-uc-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-uc-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-image-unsigned-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-image-unsigned-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-extra-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-modules-nvidia-fs-nvidia - 6.8.0-1024.27 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1024.27 linux-nvidia - 6.8.0-1024.27 linux-nvidia-64k - 6.8.0-1024.27 linux-nvidia-headers-6.8.0-1024 - 6.8.0-1024.27 linux-nvidia-tools-6.8.0-1024 - 6.8.0-1024.27 linux-tools-6.8.0-1024-nvidia - 6.8.0-1024.27 linux-tools-6.8.0-1024-nvidia-64k - 6.8.0-1024.27 linux-tools-nvidia - 6.8.0-1024.27 linux-tools-nvidia-64k - 6.8.0-1024.27 No subscription required linux-buildinfo-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-buildinfo-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-headers-nvidia-lowlatency - 6.8.0-1024.27.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-uc-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-uc-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-image-unsigned-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-image-unsigned-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-extra-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1024.27.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-nvidia-lowlatency - 6.8.0-1024.27.1 linux-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-nvidia-lowlatency-headers-6.8.0-1024 - 6.8.0-1024.27.1 linux-nvidia-lowlatency-tools-6.8.0-1024 - 6.8.0-1024.27.1 linux-tools-6.8.0-1024-nvidia-lowlatency - 6.8.0-1024.27.1 linux-tools-6.8.0-1024-nvidia-lowlatency-64k - 6.8.0-1024.27.1 linux-tools-nvidia-lowlatency - 6.8.0-1024.27.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1024.27.1 No subscription required linux-aws - 6.8.0-1025.27 linux-aws-cloud-tools-6.8.0-1025 - 6.8.0-1025.27 linux-aws-headers-6.8.0-1025 - 6.8.0-1025.27 linux-aws-lts-24.04 - 6.8.0-1025.27 linux-aws-tools-6.8.0-1025 - 6.8.0-1025.27 linux-buildinfo-6.8.0-1025-aws - 6.8.0-1025.27 linux-cloud-tools-6.8.0-1025-aws - 6.8.0-1025.27 linux-headers-6.8.0-1025-aws - 6.8.0-1025.27 linux-headers-aws - 6.8.0-1025.27 linux-headers-aws-lts-24.04 - 6.8.0-1025.27 linux-image-6.8.0-1025-aws - 6.8.0-1025.27 linux-image-aws - 6.8.0-1025.27 linux-image-aws-lts-24.04 - 6.8.0-1025.27 linux-image-unsigned-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-extra-6.8.0-1025-aws - 6.8.0-1025.27 linux-modules-extra-aws - 6.8.0-1025.27 linux-modules-extra-aws-lts-24.04 - 6.8.0-1025.27 linux-tools-6.8.0-1025-aws - 6.8.0-1025.27 linux-tools-aws - 6.8.0-1025.27 linux-tools-aws-lts-24.04 - 6.8.0-1025.27 No subscription required linux-buildinfo-6.8.0-1026-gcp - 6.8.0-1026.28 linux-buildinfo-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-gcp - 6.8.0-1026.28 linux-gcp-64k - 6.8.0-1026.28 linux-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-gcp-headers-6.8.0-1026 - 6.8.0-1026.28 linux-gcp-lts-24.04 - 6.8.0-1026.28 linux-gcp-tools-6.8.0-1026 - 6.8.0-1026.28 linux-headers-6.8.0-1026-gcp - 6.8.0-1026.28 linux-headers-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-headers-gcp - 6.8.0-1026.28 linux-headers-gcp-64k - 6.8.0-1026.28 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-headers-gcp-lts-24.04 - 6.8.0-1026.28 linux-image-6.8.0-1026-gcp - 6.8.0-1026.28 linux-image-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-image-gcp - 6.8.0-1026.28 linux-image-gcp-64k - 6.8.0-1026.28 linux-image-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-image-gcp-lts-24.04 - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-gcp - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-6.8.0-1026-gcp - 6.8.0-1026.28 linux-modules-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-gcp - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-modules-extra-gcp - 6.8.0-1026.28 linux-modules-extra-gcp-64k - 6.8.0-1026.28 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1026.28 linux-tools-6.8.0-1026-gcp - 6.8.0-1026.28 linux-tools-6.8.0-1026-gcp-64k - 6.8.0-1026.28 linux-tools-gcp - 6.8.0-1026.28 linux-tools-gcp-64k - 6.8.0-1026.28 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1026.28 linux-tools-gcp-lts-24.04 - 6.8.0-1026.28 No subscription required linux-bpf-dev - 6.8.0-56.58 linux-buildinfo-6.8.0-56-generic - 6.8.0-56.58 linux-buildinfo-6.8.0-56-generic-64k - 6.8.0-56.58 linux-cloud-tools-6.8.0-56 - 6.8.0-56.58 linux-cloud-tools-6.8.0-56-generic - 6.8.0-56.58 linux-cloud-tools-common - 6.8.0-56.58 linux-cloud-tools-generic - 6.8.0-56.58 linux-cloud-tools-virtual - 6.8.0-56.58 linux-crashdump - 6.8.0-56.58 linux-doc - 6.8.0-56.58 linux-generic - 6.8.0-56.58 linux-generic-64k - 6.8.0-56.58 linux-generic-lpae - 6.8.0-56.58 linux-headers-6.8.0-56 - 6.8.0-56.58 linux-headers-6.8.0-56-generic - 6.8.0-56.58 linux-headers-6.8.0-56-generic-64k - 6.8.0-56.58 linux-headers-generic - 6.8.0-56.58 linux-headers-generic-64k - 6.8.0-56.58 linux-headers-generic-lpae - 6.8.0-56.58 linux-headers-kvm - 6.8.0-56.58 linux-headers-laptop-23.10 - 6.8.0-56.58 linux-headers-oem-20.04 - 6.8.0-56.58 linux-headers-oem-20.04b - 6.8.0-56.58 linux-headers-oem-20.04c - 6.8.0-56.58 linux-headers-oem-20.04d - 6.8.0-56.58 linux-headers-oem-22.04 - 6.8.0-56.58 linux-headers-virtual - 6.8.0-56.58 linux-image-extra-virtual - 6.8.0-56.58 linux-image-generic - 6.8.0-56.58 linux-image-generic-64k - 6.8.0-56.58 linux-image-generic-lpae - 6.8.0-56.58 linux-image-kvm - 6.8.0-56.58 linux-image-laptop-23.10 - 6.8.0-56.58 linux-image-oem-20.04 - 6.8.0-56.58 linux-image-oem-20.04b - 6.8.0-56.58 linux-image-oem-20.04c - 6.8.0-56.58 linux-image-oem-20.04d - 6.8.0-56.58 linux-image-oem-22.04 - 6.8.0-56.58 linux-image-uc-generic - 6.8.0-56.58 linux-image-unsigned-6.8.0-56-generic - 6.8.0-56.58 linux-image-unsigned-6.8.0-56-generic-64k - 6.8.0-56.58 linux-image-virtual - 6.8.0-56.58 linux-kvm - 6.8.0-56.58 linux-laptop-23.10 - 6.8.0-56.58 linux-lib-rust-6.8.0-56-generic - 6.8.0-56.58 linux-libc-dev - 6.8.0-56.58 linux-modules-6.8.0-56-generic - 6.8.0-56.58 linux-modules-6.8.0-56-generic-64k - 6.8.0-56.58 linux-modules-extra-6.8.0-56-generic - 6.8.0-56.58 linux-modules-ipu6-6.8.0-56-generic - 6.8.0-56.58 linux-modules-ipu6-generic - 6.8.0-56.58 linux-modules-iwlwifi-6.8.0-56-generic - 6.8.0-56.58 linux-modules-iwlwifi-generic - 6.8.0-56.58 linux-modules-iwlwifi-oem-20.04 - 6.8.0-56.58 linux-modules-iwlwifi-oem-20.04d - 6.8.0-56.58 linux-modules-iwlwifi-oem-22.04 - 6.8.0-56.58 linux-modules-usbio-6.8.0-56-generic - 6.8.0-56.58 linux-modules-usbio-generic - 6.8.0-56.58 linux-oem-20.04 - 6.8.0-56.58 linux-oem-20.04b - 6.8.0-56.58 linux-oem-20.04c - 6.8.0-56.58 linux-oem-20.04d - 6.8.0-56.58 linux-oem-22.04 - 6.8.0-56.58 linux-source - 6.8.0-56.58 linux-source-6.8.0 - 6.8.0-56.58 linux-tools-6.8.0-56 - 6.8.0-56.58 linux-tools-6.8.0-56-generic - 6.8.0-56.58 linux-tools-6.8.0-56-generic-64k - 6.8.0-56.58 linux-tools-common - 6.8.0-56.58 linux-tools-generic - 6.8.0-56.58 linux-tools-generic-64k - 6.8.0-56.58 linux-tools-generic-lpae - 6.8.0-56.58 linux-tools-host - 6.8.0-56.58 linux-tools-kvm - 6.8.0-56.58 linux-tools-laptop-23.10 - 6.8.0-56.58 linux-tools-oem-20.04 - 6.8.0-56.58 linux-tools-oem-20.04b - 6.8.0-56.58 linux-tools-oem-20.04c - 6.8.0-56.58 linux-tools-oem-20.04d - 6.8.0-56.58 linux-tools-oem-22.04 - 6.8.0-56.58 linux-tools-virtual - 6.8.0-56.58 linux-virtual - 6.8.0-56.58 No subscription required linux-image-6.8.0-56-generic - 6.8.0-56.58+1 linux-image-6.8.0-56-generic-64k - 6.8.0-56.58+1 linux-image-uc-6.8.0-56-generic - 6.8.0-56.58+1 linux-image-uc-6.8.0-56-generic-64k - 6.8.0-56.58+1 No subscription required linux-buildinfo-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-buildinfo-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-cloud-tools-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-cloud-tools-lowlatency - 6.8.0-56.58.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-headers-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-headers-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-headers-lowlatency - 6.8.0-56.58.1 linux-headers-lowlatency-64k - 6.8.0-56.58.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-image-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-image-lowlatency - 6.8.0-56.58.1 linux-image-lowlatency-64k - 6.8.0-56.58.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-image-unsigned-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-image-unsigned-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-lowlatency - 6.8.0-56.58.1 linux-lowlatency-64k - 6.8.0-56.58.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-lowlatency-cloud-tools-6.8.0-56 - 6.8.0-56.58.1 linux-lowlatency-headers-6.8.0-56 - 6.8.0-56.58.1 linux-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 linux-lowlatency-lib-rust-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-lowlatency-tools-6.8.0-56 - 6.8.0-56.58.1 linux-modules-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-modules-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-modules-iwlwifi-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-modules-iwlwifi-lowlatency - 6.8.0-56.58.1 linux-tools-6.8.0-56-lowlatency - 6.8.0-56.58.1 linux-tools-6.8.0-56-lowlatency-64k - 6.8.0-56.58.1 linux-tools-lowlatency - 6.8.0-56.58.1 linux-tools-lowlatency-64k - 6.8.0-56.58.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-56.58.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-56.58.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-56.58.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-56.58.1 No subscription required High CVE-2024-47711 CVE-2024-47726 CVE-2024-49865 CVE-2024-49893 CVE-2024-49914 CVE-2024-49920 CVE-2024-49921 CVE-2024-49968 CVE-2024-49972 CVE-2024-50009 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50032 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50117 CVE-2024-50134 CVE-2024-50148 CVE-2024-50171 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50229 CVE-2024-50233 CVE-2024-53156 CVE-2024-53165 CVE-2024-53170 CVE-2024-56582 CVE-2024-56614 CVE-2024-56663 USN-7383-2 -- Linux kernel (Real-time) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Drivers core; - Ublk userspace block driver; - Compressed RAM block device driver; - CPU frequency scaling framework; - DAX dirext access to differentiated memory framework; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - Pin controllers subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - Framebuffer layer; - BTRFS file system; - Ext4 file system; - F2FS file system; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Network traffic control; - Network sockets; - User-space API (UAPI); - io_uring subsystem; - Kernel thread helper (kthread); - RCU subsystem; - Timer subsystem; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - Multipath TCP; - Netfilter; - Netlink; - Unix domain sockets; - Wireless networking; - eXpress Data Path; (CVE-2024-50182, CVE-2024-50020, CVE-2024-50060, CVE-2024-50074, CVE-2024-50193, CVE-2024-50117, CVE-2024-50201, CVE-2024-50033, CVE-2024-50056, CVE-2024-50026, CVE-2024-50059, CVE-2024-50041, CVE-2024-50083, CVE-2024-50038, CVE-2024-50229, CVE-2024-50028, CVE-2024-50183, CVE-2024-50196, CVE-2024-50029, CVE-2024-50093, CVE-2024-50188, CVE-2024-50025, CVE-2024-50200, CVE-2024-50068, CVE-2024-49920, CVE-2024-50198, CVE-2024-50035, CVE-2024-50042, CVE-2024-50023, CVE-2024-50047, CVE-2024-56582, CVE-2024-50090, CVE-2024-50062, CVE-2024-50073, CVE-2024-50063, CVE-2024-50098, CVE-2024-50197, CVE-2024-50040, CVE-2024-50180, CVE-2024-53170, CVE-2024-50087, CVE-2024-50031, CVE-2024-50202, CVE-2024-50058, CVE-2024-50186, CVE-2024-50134, CVE-2024-50194, CVE-2024-50075, CVE-2024-50046, CVE-2024-50078, CVE-2024-50066, CVE-2024-53156, CVE-2024-49893, CVE-2024-50021, CVE-2024-47711, CVE-2024-47726, CVE-2024-50024, CVE-2024-49865, CVE-2024-50064, CVE-2024-50049, CVE-2024-50171, CVE-2024-50019, CVE-2024-50077, CVE-2024-50199, CVE-2024-50072, CVE-2024-50069, CVE-2024-50048, CVE-2024-49972, CVE-2024-53165, CVE-2024-50022, CVE-2024-50084, CVE-2024-50185, CVE-2024-50055, CVE-2024-50187, CVE-2024-50009, CVE-2024-50082, CVE-2024-50085, CVE-2024-50095, CVE-2024-50195, CVE-2024-50080, CVE-2024-50076, CVE-2024-50088, CVE-2024-50039, CVE-2024-50044, CVE-2024-50030, CVE-2024-49968, CVE-2024-50148, CVE-2024-50192, CVE-2024-50032, CVE-2024-50061, CVE-2024-50233, CVE-2024-50099, CVE-2024-49921, CVE-2024-50184, CVE-2024-50065, CVE-2024-49914, CVE-2024-50027, CVE-2024-50070, CVE-2024-50086, CVE-2024-50189, CVE-2024-56614, CVE-2024-50057, CVE-2024-50096, CVE-2024-50045, CVE-2024-50036, CVE-2024-56663, CVE-2024-50191, CVE-2024-50101) Update Instructions: Run `sudo pro fix USN-7383-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1018-realtime - 6.8.1-1018.19 linux-cloud-tools-6.8.1-1018-realtime - 6.8.1-1018.19 linux-headers-6.8.1-1018-realtime - 6.8.1-1018.19 linux-headers-realtime - 6.8.1-1018.19 linux-headers-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-6.8.1-1018-realtime - 6.8.1-1018.19 linux-image-realtime - 6.8.1-1018.19 linux-image-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-uc-6.8.1-1018-realtime - 6.8.1-1018.19 linux-image-uc-realtime - 6.8.1-1018.19 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1018.19 linux-image-unsigned-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-extra-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-6.8.1-1018-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-realtime - 6.8.1-1018.19 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1018.19 linux-realtime - 6.8.1-1018.19 linux-realtime-cloud-tools-6.8.1-1018 - 6.8.1-1018.19 linux-realtime-headers-6.8.1-1018 - 6.8.1-1018.19 linux-realtime-hwe-24.04 - 6.8.1-1018.19 linux-realtime-tools-6.8.1-1018 - 6.8.1-1018.19 linux-tools-6.8.1-1018-realtime - 6.8.1-1018.19 linux-tools-realtime - 6.8.1-1018.19 linux-tools-realtime-hwe-24.04 - 6.8.1-1018.19 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-47711 CVE-2024-47726 CVE-2024-49865 CVE-2024-49893 CVE-2024-49914 CVE-2024-49920 CVE-2024-49921 CVE-2024-49968 CVE-2024-49972 CVE-2024-50009 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50032 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50117 CVE-2024-50134 CVE-2024-50148 CVE-2024-50171 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50229 CVE-2024-50233 CVE-2024-53156 CVE-2024-53165 CVE-2024-53170 CVE-2024-56582 CVE-2024-56614 CVE-2024-56663 USN-7384-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49994, CVE-2024-47740, CVE-2024-49936, CVE-2024-47716, CVE-2024-47733, CVE-2024-50075, CVE-2024-49870, CVE-2024-50007, CVE-2024-49897, CVE-2024-49915, CVE-2024-47756, CVE-2024-47700, CVE-2024-49946, CVE-2024-50012, CVE-2024-47750, CVE-2024-49863, CVE-2024-50059, CVE-2024-50026, CVE-2024-49995, CVE-2024-50035, CVE-2024-47751, CVE-2024-50096, CVE-2024-50082, CVE-2024-50090, CVE-2024-50000, CVE-2024-47690, CVE-2024-47741, CVE-2024-49898, CVE-2024-47685, CVE-2024-50038, CVE-2024-49957, CVE-2024-47682, CVE-2024-50002, CVE-2024-47709, CVE-2024-50201, CVE-2024-49927, CVE-2024-50076, CVE-2024-56582, CVE-2024-47742, CVE-2024-47734, CVE-2024-50040, CVE-2024-49862, CVE-2024-49942, CVE-2024-50193, CVE-2024-49880, CVE-2024-50008, CVE-2024-49949, CVE-2024-50056, CVE-2024-50099, CVE-2024-50180, CVE-2024-50045, CVE-2024-49923, CVE-2024-49987, CVE-2024-49884, CVE-2024-50031, CVE-2024-47705, CVE-2024-47728, CVE-2024-49969, CVE-2024-50077, CVE-2024-50188, CVE-2024-49852, CVE-2024-49890, CVE-2024-47745, CVE-2024-50058, CVE-2024-50186, CVE-2024-47749, CVE-2024-56614, CVE-2024-50021, CVE-2024-50055, CVE-2024-47727, CVE-2024-47677, CVE-2024-49922, CVE-2024-50015, CVE-2024-50084, CVE-2024-47689, CVE-2024-50101, CVE-2024-47699, CVE-2024-49947, CVE-2024-49999, CVE-2024-49868, CVE-2024-50184, CVE-2024-50187, CVE-2024-47757, CVE-2024-49900, CVE-2024-47703, CVE-2024-49975, CVE-2024-47692, CVE-2024-49980, CVE-2024-49951, CVE-2024-49930, CVE-2024-49867, CVE-2024-49860, CVE-2024-50009, CVE-2024-50072, CVE-2024-50229, CVE-2024-49954, CVE-2024-50183, CVE-2024-49858, CVE-2024-49909, CVE-2024-49926, CVE-2024-47754, CVE-2024-50027, CVE-2024-50200, CVE-2024-50196, CVE-2024-50086, CVE-2024-47739, CVE-2024-49978, CVE-2024-49983, CVE-2024-49894, CVE-2024-49973, CVE-2024-49888, CVE-2024-49974, CVE-2024-47672, CVE-2024-49977, CVE-2024-47738, CVE-2024-49893, CVE-2024-49876, CVE-2024-49960, CVE-2024-49955, CVE-2024-47670, CVE-2024-47706, CVE-2024-49931, CVE-2024-47686, CVE-2024-49855, CVE-2024-49901, CVE-2024-47752, CVE-2024-47675, CVE-2024-47704, CVE-2024-47735, CVE-2024-47744, CVE-2024-50088, CVE-2024-50070, CVE-2024-47707, CVE-2024-50176, CVE-2024-50080, CVE-2024-50175, CVE-2024-47731, CVE-2024-49853, CVE-2024-49929, CVE-2024-49989, CVE-2024-49921, CVE-2024-49965, CVE-2024-49891, CVE-2024-50005, CVE-2024-47715, CVE-2024-50085, CVE-2024-50189, CVE-2024-47723, CVE-2024-50020, CVE-2024-49902, CVE-2024-47730, CVE-2024-53156, CVE-2024-49895, CVE-2024-49997, CVE-2024-50192, CVE-2024-49850, CVE-2024-50062, CVE-2024-50033, CVE-2024-49972, CVE-2024-49945, CVE-2024-50036, CVE-2024-50202, CVE-2024-50095, CVE-2024-49913, CVE-2024-50049, CVE-2024-50148, CVE-2024-49948, CVE-2024-49866, CVE-2024-49963, CVE-2024-49907, CVE-2024-50117, CVE-2024-49885, CVE-2024-49874, CVE-2024-50198, CVE-2024-49856, CVE-2024-49986, CVE-2024-49871, CVE-2024-50028, CVE-2024-49889, CVE-2024-50024, CVE-2024-47687, CVE-2024-50065, CVE-2024-49953, CVE-2024-47748, CVE-2024-47747, CVE-2024-47673, CVE-2024-49928, CVE-2024-50191, CVE-2024-50016, CVE-2024-53170, CVE-2024-49933, CVE-2024-50029, CVE-2024-50098, CVE-2024-49988, CVE-2024-49985, CVE-2024-50042, CVE-2024-50171, CVE-2024-50233, CVE-2024-49976, CVE-2024-49996, CVE-2024-49950, CVE-2024-49968, CVE-2024-50083, CVE-2024-49966, CVE-2024-49851, CVE-2024-50066, CVE-2024-49864, CVE-2024-50048, CVE-2024-50069, CVE-2024-50001, CVE-2024-50194, CVE-2024-47693, CVE-2024-49905, CVE-2024-50134, CVE-2024-49944, CVE-2024-50060, CVE-2024-49892, CVE-2024-49982, CVE-2024-49883, CVE-2024-49875, CVE-2024-47691, CVE-2024-47714, CVE-2024-47712, CVE-2024-50025, CVE-2024-50023, CVE-2024-47726, CVE-2024-50041, CVE-2024-49896, CVE-2024-50195, CVE-2024-47679, CVE-2024-47678, CVE-2024-49877, CVE-2024-47684, CVE-2024-47719, CVE-2024-49937, CVE-2024-53144, CVE-2024-47737, CVE-2024-49998, CVE-2024-49879, CVE-2024-50019, CVE-2024-50093, CVE-2024-50073, CVE-2024-50064, CVE-2024-50006, CVE-2024-47695, CVE-2024-49882, CVE-2024-50179, CVE-2024-49865, CVE-2024-47702, CVE-2024-50046, CVE-2024-49919, CVE-2024-47697, CVE-2024-50017, CVE-2024-50014, CVE-2024-49861, CVE-2024-50197, CVE-2024-49886, CVE-2024-49938, CVE-2024-49991, CVE-2024-49981, CVE-2024-56663, CVE-2024-49914, CVE-2024-49920, CVE-2024-47671, CVE-2024-49961, CVE-2024-47698, CVE-2024-49952, CVE-2024-47688, CVE-2024-50078, CVE-2024-50199, CVE-2024-49918, CVE-2024-50044, CVE-2024-50013, CVE-2024-47711, CVE-2024-49917, CVE-2024-50057, CVE-2024-47718, CVE-2024-49911, CVE-2024-49912, CVE-2024-53165, CVE-2024-50068, CVE-2024-50087, CVE-2024-47720, CVE-2024-49958, CVE-2024-49934, CVE-2024-49859, CVE-2024-47710, CVE-2024-49903, CVE-2024-49925, CVE-2024-50061, CVE-2024-41016, CVE-2024-47696, CVE-2024-47701, CVE-2024-49939, CVE-2024-49924, CVE-2024-49935, CVE-2024-50030, CVE-2024-50074, CVE-2024-47681, CVE-2024-47743, CVE-2024-49992, CVE-2024-49881, CVE-2024-50063, CVE-2024-47713, CVE-2024-50039, CVE-2024-50185, CVE-2024-49962, CVE-2024-50182, CVE-2024-50022, CVE-2024-49959, CVE-2024-50047, CVE-2024-53104, CVE-2024-49878, CVE-2024-47732, CVE-2024-47753) Update Instructions: Run `sudo pro fix USN-7384-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.8.0-1025 - 6.8.0-1025.30 linux-azure-fde-lts-24.04 - 6.8.0-1025.30 linux-azure-headers-6.8.0-1025 - 6.8.0-1025.30 linux-azure-lts-24.04 - 6.8.0-1025.30 linux-azure-tools-6.8.0-1025 - 6.8.0-1025.30 linux-buildinfo-6.8.0-1025-azure - 6.8.0-1025.30 linux-cloud-tools-6.8.0-1025-azure - 6.8.0-1025.30 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1025.30 linux-headers-6.8.0-1025-azure - 6.8.0-1025.30 linux-headers-azure-lts-24.04 - 6.8.0-1025.30 linux-image-6.8.0-1025-azure - 6.8.0-1025.30 linux-image-6.8.0-1025-azure-fde - 6.8.0-1025.30 linux-image-azure-fde-lts-24.04 - 6.8.0-1025.30 linux-image-azure-lts-24.04 - 6.8.0-1025.30 linux-image-unsigned-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-extra-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-extra-azure-lts-24.04 - 6.8.0-1025.30 linux-modules-involflt-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1025.30 linux-modules-iwlwifi-6.8.0-1025-azure - 6.8.0-1025.30 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1025.30 linux-tools-6.8.0-1025-azure - 6.8.0-1025.30 linux-tools-azure-lts-24.04 - 6.8.0-1025.30 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47711 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47726 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49865 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49893 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49968 CVE-2024-49969 CVE-2024-49972 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50117 CVE-2024-50134 CVE-2024-50148 CVE-2024-50171 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50229 CVE-2024-50233 CVE-2024-53104 CVE-2024-53144 CVE-2024-53156 CVE-2024-53165 CVE-2024-53170 CVE-2024-56582 CVE-2024-56614 CVE-2024-56663 CVE-2024-8805 CVE-2025-0927 CVE-2025-2312 USN-7385-1 -- Linux kernel (IBM) vulnerabilities Ubuntu 24.04 LTS Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49927, CVE-2024-47719, CVE-2024-49878, CVE-2024-50200, CVE-2024-50013, CVE-2024-50187, CVE-2024-49852, CVE-2024-49913, CVE-2024-50080, CVE-2024-49903, CVE-2024-47745, CVE-2024-50184, CVE-2024-50117, CVE-2024-49863, CVE-2024-49973, CVE-2024-47727, CVE-2024-53170, CVE-2024-49933, CVE-2024-49900, CVE-2024-50095, CVE-2024-49928, CVE-2024-49858, CVE-2024-47731, CVE-2024-49896, CVE-2024-53104, CVE-2024-49972, CVE-2024-49969, CVE-2024-50176, CVE-2024-47739, CVE-2024-49995, CVE-2024-49982, CVE-2024-50044, CVE-2024-49957, CVE-2024-47748, CVE-2024-47744, CVE-2024-49978, CVE-2024-49879, CVE-2024-49987, CVE-2024-49929, CVE-2024-49905, CVE-2024-47723, CVE-2024-53144, CVE-2024-50066, CVE-2024-47735, CVE-2024-50057, CVE-2024-49890, CVE-2024-49963, CVE-2024-49955, CVE-2024-49974, CVE-2024-50049, CVE-2024-47710, CVE-2024-47682, CVE-2024-47734, CVE-2024-47691, CVE-2024-49999, CVE-2024-50098, CVE-2024-47672, CVE-2024-50056, CVE-2024-49983, CVE-2024-50005, CVE-2024-50045, CVE-2024-49866, CVE-2024-49953, CVE-2024-47750, CVE-2024-49917, CVE-2024-50026, CVE-2024-50009, CVE-2024-47718, CVE-2024-50070, CVE-2024-47700, CVE-2024-49986, CVE-2024-49907, CVE-2024-49884, CVE-2024-50085, CVE-2024-50087, CVE-2024-49875, CVE-2024-47728, CVE-2024-49861, CVE-2024-49851, CVE-2024-49980, CVE-2024-49898, CVE-2024-47681, CVE-2024-49965, CVE-2024-49960, CVE-2024-50020, CVE-2024-50012, CVE-2024-50186, CVE-2024-49889, CVE-2024-50030, CVE-2024-50046, CVE-2024-50180, CVE-2024-49966, CVE-2024-49897, CVE-2024-49985, CVE-2024-49918, CVE-2024-47754, CVE-2024-50082, CVE-2024-47757, CVE-2024-47711, CVE-2024-47737, CVE-2024-47716, CVE-2024-50069, CVE-2024-47696, CVE-2024-50031, CVE-2024-50202, CVE-2024-47713, CVE-2024-49894, CVE-2024-49921, CVE-2024-50022, CVE-2024-49856, CVE-2024-47740, CVE-2024-49868, CVE-2024-49919, CVE-2024-47679, CVE-2024-47695, CVE-2024-47714, CVE-2024-49996, CVE-2024-50196, CVE-2024-49997, CVE-2024-49883, CVE-2024-49936, CVE-2024-49962, CVE-2024-47673, CVE-2024-56663, CVE-2024-49892, CVE-2024-47685, CVE-2024-50233, CVE-2024-49891, CVE-2024-47738, CVE-2024-49870, CVE-2024-49885, CVE-2024-50025, CVE-2024-50006, CVE-2024-49968, CVE-2024-47709, CVE-2024-47751, CVE-2024-50058, CVE-2024-50086, CVE-2024-50072, CVE-2024-50195, CVE-2024-56582, CVE-2024-50014, CVE-2024-49886, CVE-2024-47743, CVE-2024-50185, CVE-2024-50193, CVE-2024-49909, CVE-2024-50077, CVE-2024-49930, CVE-2024-49946, CVE-2024-50192, CVE-2024-50041, CVE-2024-47698, CVE-2024-50188, CVE-2024-49977, CVE-2024-47687, CVE-2024-49945, CVE-2024-50008, CVE-2024-49859, CVE-2024-50062, CVE-2024-49880, CVE-2024-47671, CVE-2024-49867, CVE-2024-49912, CVE-2024-56614, CVE-2024-49862, CVE-2024-50021, CVE-2024-47670, CVE-2024-49911, CVE-2024-49855, CVE-2024-47712, CVE-2024-50229, CVE-2024-50096, CVE-2024-49895, CVE-2024-47677, CVE-2024-49934, CVE-2024-53156, CVE-2024-49893, CVE-2024-49925, CVE-2024-50063, CVE-2024-49926, CVE-2024-50201, CVE-2024-50033, CVE-2024-50199, CVE-2024-49874, CVE-2024-47732, CVE-2024-50078, CVE-2024-49935, CVE-2024-49902, CVE-2024-49989, CVE-2024-47675, CVE-2024-50064, CVE-2024-50015, CVE-2024-41016, CVE-2024-49949, CVE-2024-50090, CVE-2024-49860, CVE-2024-50036, CVE-2024-50084, CVE-2024-50182, CVE-2024-50061, CVE-2024-47702, CVE-2024-47730, CVE-2024-49951, CVE-2024-49938, CVE-2024-50088, CVE-2024-50198, CVE-2024-49998, CVE-2024-49931, CVE-2024-49944, CVE-2024-50000, CVE-2024-49954, CVE-2024-47753, CVE-2024-49976, CVE-2024-50048, CVE-2024-49881, CVE-2024-50093, CVE-2024-50019, CVE-2024-50059, CVE-2024-50016, CVE-2024-50068, CVE-2024-49920, CVE-2024-50035, CVE-2024-50197, CVE-2024-47699, CVE-2024-49914, CVE-2024-50191, CVE-2024-50083, CVE-2024-47701, CVE-2024-49877, CVE-2024-50017, CVE-2024-49915, CVE-2024-50001, CVE-2024-49864, CVE-2024-50189, CVE-2024-50101, CVE-2024-47704, CVE-2024-50024, CVE-2024-50038, CVE-2024-49850, CVE-2024-50027, CVE-2024-49952, CVE-2024-50074, CVE-2024-50171, CVE-2024-53165, CVE-2024-47689, CVE-2024-49865, CVE-2024-49853, CVE-2024-47742, CVE-2024-49994, CVE-2024-50179, CVE-2024-47686, CVE-2024-49975, CVE-2024-49948, CVE-2024-50099, CVE-2024-50175, CVE-2024-50028, CVE-2024-49947, CVE-2024-47741, CVE-2024-49888, CVE-2024-50055, CVE-2024-47749, CVE-2024-49992, CVE-2024-47715, CVE-2024-49922, CVE-2024-47756, CVE-2024-50023, CVE-2024-47720, CVE-2024-50194, CVE-2024-47688, CVE-2024-49991, CVE-2024-47705, CVE-2024-49942, CVE-2024-50047, CVE-2024-49981, CVE-2024-49950, CVE-2024-47684, CVE-2024-50065, CVE-2024-49939, CVE-2024-47726, CVE-2024-47697, CVE-2024-49959, CVE-2024-47690, CVE-2024-50040, CVE-2024-50002, CVE-2024-50029, CVE-2024-47752, CVE-2024-49924, CVE-2024-50073, CVE-2024-47733, CVE-2024-50075, CVE-2024-49937, CVE-2024-47707, CVE-2024-47692, CVE-2024-47703, CVE-2024-49988, CVE-2024-50060, CVE-2024-50039, CVE-2024-49961, CVE-2024-50042, CVE-2024-50148, CVE-2024-47678, CVE-2024-49923, CVE-2024-49901, CVE-2024-47706, CVE-2024-49882, CVE-2024-47693, CVE-2024-49876, CVE-2024-47747, CVE-2024-49871, CVE-2024-50076, CVE-2024-50183, CVE-2024-50007, CVE-2024-49958, CVE-2024-50134) Update Instructions: Run `sudo pro fix USN-7385-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1022-ibm - 6.8.0-1022.22 linux-headers-6.8.0-1022-ibm - 6.8.0-1022.22 linux-headers-ibm - 6.8.0-1022.22 linux-headers-ibm-classic - 6.8.0-1022.22 linux-headers-ibm-lts-24.04 - 6.8.0-1022.22 linux-ibm - 6.8.0-1022.22 linux-ibm-classic - 6.8.0-1022.22 linux-ibm-headers-6.8.0-1022 - 6.8.0-1022.22 linux-ibm-lts-24.04 - 6.8.0-1022.22 linux-ibm-tools-6.8.0-1022 - 6.8.0-1022.22 linux-image-6.8.0-1022-ibm - 6.8.0-1022.22 linux-image-ibm - 6.8.0-1022.22 linux-image-ibm-classic - 6.8.0-1022.22 linux-image-ibm-lts-24.04 - 6.8.0-1022.22 linux-image-unsigned-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-extra-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-6.8.0-1022-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-ibm - 6.8.0-1022.22 linux-modules-iwlwifi-ibm-classic - 6.8.0-1022.22 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1022.22 linux-tools-6.8.0-1022-ibm - 6.8.0-1022.22 linux-tools-ibm - 6.8.0-1022.22 linux-tools-ibm-classic - 6.8.0-1022.22 linux-tools-ibm-lts-24.04 - 6.8.0-1022.22 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47711 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47715 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47726 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49865 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49893 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49968 CVE-2024-49969 CVE-2024-49972 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50117 CVE-2024-50134 CVE-2024-50148 CVE-2024-50171 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50229 CVE-2024-50233 CVE-2024-53104 CVE-2024-53144 CVE-2024-53156 CVE-2024-53165 CVE-2024-53170 CVE-2024-56582 CVE-2024-56614 CVE-2024-56663 CVE-2024-8805 CVE-2025-0927 USN-7386-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - CPU frequency scaling framework; - Hardware crypto device drivers; - DAX dirext access to differentiated memory framework; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - Pin controllers subsystem; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - SuperH / SH-Mobile drivers; - Direct Digital Synthesis drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB Gadget drivers; - USB Host Controller drivers; - TI TPS6598x USB Power Delivery controller driver; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Network traffic control; - Network sockets; - TCP network protocol; - User-space API (UAPI); - io_uring subsystem; - Perf events; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Timer subsystem; - Tracing infrastructure; - Maple Tree data structure library; - Memory management; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - AudioScience HPI driver; - KVM core; (CVE-2024-49952, CVE-2024-49920, CVE-2024-49945, CVE-2024-50180, CVE-2024-49944, CVE-2024-49987, CVE-2024-50148, CVE-2024-49959, CVE-2024-50063, CVE-2024-50083, CVE-2024-49878, CVE-2024-49870, CVE-2024-49863, CVE-2024-49921, CVE-2024-49992, CVE-2024-47691, CVE-2024-49913, CVE-2024-47712, CVE-2024-49948, CVE-2024-49976, CVE-2024-50085, CVE-2024-49891, CVE-2024-56614, CVE-2024-47713, CVE-2024-47703, CVE-2024-50191, CVE-2024-50087, CVE-2024-49958, CVE-2024-49868, CVE-2024-49922, CVE-2024-49960, CVE-2024-50019, CVE-2024-47749, CVE-2024-49996, CVE-2024-47677, CVE-2024-50065, CVE-2024-47744, CVE-2024-49968, CVE-2024-49985, CVE-2024-47752, CVE-2024-50017, CVE-2024-50183, CVE-2024-47709, CVE-2024-49938, CVE-2024-49876, CVE-2024-49893, CVE-2024-50134, CVE-2024-49972, CVE-2024-49934, CVE-2024-50015, CVE-2024-49856, CVE-2024-49853, CVE-2024-47711, CVE-2024-49949, CVE-2024-50026, CVE-2024-47681, CVE-2024-50000, CVE-2024-50189, CVE-2024-47716, CVE-2024-47723, CVE-2024-50044, CVE-2024-50179, CVE-2024-49871, CVE-2024-50008, CVE-2024-49955, CVE-2024-50007, CVE-2024-47695, CVE-2024-49889, CVE-2024-49954, CVE-2024-49894, CVE-2024-50014, CVE-2024-47731, CVE-2024-50055, CVE-2024-50098, CVE-2024-49930, CVE-2024-47684, CVE-2024-47705, CVE-2024-50029, CVE-2024-49901, CVE-2024-47689, CVE-2024-50022, CVE-2024-50009, CVE-2024-49937, CVE-2024-50197, CVE-2024-49911, CVE-2024-50076, CVE-2024-50002, CVE-2024-50077, CVE-2024-47679, CVE-2024-50025, CVE-2024-50069, CVE-2024-50101, CVE-2024-49942, CVE-2024-49986, CVE-2024-50012, CVE-2024-49858, CVE-2024-49884, CVE-2024-50201, CVE-2024-47701, CVE-2024-49994, CVE-2024-49897, CVE-2024-47687, CVE-2024-47751, CVE-2024-50001, CVE-2024-50117, CVE-2024-49909, CVE-2024-50086, CVE-2024-50064, CVE-2024-50088, CVE-2024-50005, CVE-2024-50184, CVE-2024-49882, CVE-2024-49936, CVE-2024-49933, CVE-2024-49995, CVE-2024-47704, CVE-2024-50066, CVE-2024-49898, CVE-2024-50068, CVE-2024-50192, CVE-2024-53104, CVE-2024-49860, CVE-2024-47741, CVE-2024-50039, CVE-2024-47699, CVE-2024-49861, CVE-2024-49969, CVE-2024-49950, CVE-2024-50194, CVE-2024-49929, CVE-2024-50006, CVE-2024-49997, CVE-2024-49983, CVE-2024-47710, CVE-2024-50200, CVE-2024-47692, CVE-2024-47748, CVE-2024-49855, CVE-2024-50182, CVE-2024-47706, CVE-2024-50188, CVE-2024-47732, CVE-2024-47707, CVE-2024-50048, CVE-2024-50058, CVE-2024-49912, CVE-2024-49966, CVE-2024-49852, CVE-2024-47753, CVE-2024-50202, CVE-2024-50062, CVE-2024-50056, CVE-2024-49946, CVE-2024-49902, CVE-2024-50033, CVE-2024-47750, CVE-2024-50021, CVE-2024-49939, CVE-2024-50072, CVE-2024-49851, CVE-2024-49928, CVE-2024-50061, CVE-2024-49885, CVE-2024-50047, CVE-2024-47672, CVE-2024-47734, CVE-2024-47714, CVE-2024-49886, CVE-2024-47730, CVE-2024-47697, CVE-2024-49973, CVE-2024-47718, CVE-2024-49862, CVE-2024-49963, CVE-2024-49881, CVE-2024-53165, CVE-2024-49998, CVE-2024-47757, CVE-2024-49982, CVE-2024-50186, CVE-2024-50016, CVE-2024-47675, CVE-2024-50090, CVE-2024-49917, CVE-2024-50031, CVE-2024-50093, CVE-2024-49859, CVE-2024-49890, CVE-2024-47670, CVE-2024-49919, CVE-2024-53156, CVE-2024-49924, CVE-2024-50078, CVE-2024-49864, CVE-2024-49962, CVE-2024-47720, CVE-2024-49874, CVE-2024-41016, CVE-2024-49991, CVE-2024-47726, CVE-2024-50171, CVE-2024-47682, CVE-2024-49865, CVE-2024-49988, CVE-2024-49903, CVE-2024-50035, CVE-2024-50229, CVE-2024-50075, CVE-2024-50195, CVE-2024-49947, CVE-2024-49900, CVE-2024-50040, CVE-2024-50176, CVE-2024-47686, CVE-2024-49978, CVE-2024-49923, CVE-2024-50199, CVE-2024-49999, CVE-2024-50070, CVE-2024-49953, CVE-2024-47733, CVE-2024-49888, CVE-2024-49977, CVE-2024-50080, CVE-2024-49905, CVE-2024-47737, CVE-2024-49961, CVE-2024-50030, CVE-2024-49951, CVE-2024-49892, CVE-2024-50096, CVE-2024-47735, CVE-2024-47673, CVE-2024-56663, CVE-2024-49981, CVE-2024-50049, CVE-2024-50193, CVE-2024-49957, CVE-2024-47742, CVE-2024-49880, CVE-2024-49965, CVE-2024-49927, CVE-2024-47690, CVE-2024-50057, CVE-2024-50073, CVE-2024-49931, CVE-2024-49875, CVE-2024-50041, CVE-2024-47700, CVE-2024-47719, CVE-2024-56582, CVE-2024-47738, CVE-2024-47754, CVE-2024-49850, CVE-2024-47678, CVE-2024-49935, CVE-2024-47739, CVE-2024-50028, CVE-2024-47727, CVE-2024-47728, CVE-2024-50084, CVE-2024-50095, CVE-2024-50175, CVE-2024-50198, CVE-2024-47702, CVE-2024-50187, CVE-2024-50032, CVE-2024-50074, CVE-2024-50020, CVE-2024-53144, CVE-2024-50233, CVE-2024-47698, CVE-2024-49879, CVE-2024-49896, CVE-2024-47747, CVE-2024-49877, CVE-2024-50046, CVE-2024-49866, CVE-2024-47740, CVE-2024-50042, CVE-2024-50060, CVE-2024-49925, CVE-2024-50013, CVE-2024-49867, CVE-2024-47685, CVE-2024-47743, CVE-2024-49883, CVE-2024-53170, CVE-2024-50038, CVE-2024-47756, CVE-2024-47696, CVE-2024-49980, CVE-2024-50185, CVE-2024-47693, CVE-2024-49915, CVE-2024-49914, CVE-2024-49907, CVE-2024-49989, CVE-2024-50196, CVE-2024-50027, CVE-2024-47745, CVE-2024-50045, CVE-2024-50024, CVE-2024-49918, CVE-2024-49975, CVE-2024-49974, CVE-2024-50082, CVE-2024-49895, CVE-2024-47671, CVE-2024-50059, CVE-2024-50099, CVE-2024-50023, CVE-2024-47688, CVE-2024-49926, CVE-2024-50036) Update Instructions: Run `sudo pro fix USN-7386-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-oem - 6.8.0-1024.24 linux-headers-6.8.0-1024-oem - 6.8.0-1024.24 linux-headers-oem-24.04 - 6.8.0-1024.24 linux-headers-oem-24.04a - 6.8.0-1024.24 linux-image-6.8.0-1024-oem - 6.8.0-1024.24 linux-image-oem-24.04 - 6.8.0-1024.24 linux-image-oem-24.04a - 6.8.0-1024.24 linux-image-uc-6.8.0-1024-oem - 6.8.0-1024.24 linux-image-uc-oem-24.04 - 6.8.0-1024.24 linux-image-uc-oem-24.04a - 6.8.0-1024.24 linux-image-unsigned-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-ipu6-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-ipu6-oem-24.04 - 6.8.0-1024.24 linux-modules-ipu6-oem-24.04a - 6.8.0-1024.24 linux-modules-iwlwifi-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1024.24 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1024.24 linux-modules-usbio-6.8.0-1024-oem - 6.8.0-1024.24 linux-modules-usbio-oem-24.04 - 6.8.0-1024.24 linux-modules-usbio-oem-24.04a - 6.8.0-1024.24 linux-oem-24.04 - 6.8.0-1024.24 linux-oem-24.04a - 6.8.0-1024.24 linux-oem-6.8-headers-6.8.0-1024 - 6.8.0-1024.24 linux-oem-6.8-tools-6.8.0-1024 - 6.8.0-1024.24 linux-tools-6.8.0-1024-oem - 6.8.0-1024.24 linux-tools-oem-24.04 - 6.8.0-1024.24 linux-tools-oem-24.04a - 6.8.0-1024.24 No subscription required High CVE-2024-41016 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47675 CVE-2024-47677 CVE-2024-47678 CVE-2024-47679 CVE-2024-47681 CVE-2024-47682 CVE-2024-47684 CVE-2024-47685 CVE-2024-47686 CVE-2024-47687 CVE-2024-47688 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47700 CVE-2024-47701 CVE-2024-47702 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47711 CVE-2024-47712 CVE-2024-47713 CVE-2024-47714 CVE-2024-47716 CVE-2024-47718 CVE-2024-47719 CVE-2024-47720 CVE-2024-47723 CVE-2024-47726 CVE-2024-47727 CVE-2024-47728 CVE-2024-47730 CVE-2024-47731 CVE-2024-47732 CVE-2024-47733 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47741 CVE-2024-47742 CVE-2024-47743 CVE-2024-47744 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47750 CVE-2024-47751 CVE-2024-47752 CVE-2024-47753 CVE-2024-47754 CVE-2024-47756 CVE-2024-47757 CVE-2024-49850 CVE-2024-49851 CVE-2024-49852 CVE-2024-49853 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49862 CVE-2024-49863 CVE-2024-49864 CVE-2024-49865 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49874 CVE-2024-49875 CVE-2024-49876 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49885 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49893 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49897 CVE-2024-49898 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49942 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49947 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49951 CVE-2024-49952 CVE-2024-49953 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49968 CVE-2024-49969 CVE-2024-49972 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49976 CVE-2024-49977 CVE-2024-49978 CVE-2024-49980 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49986 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49995 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-49999 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50005 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50032 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50117 CVE-2024-50134 CVE-2024-50148 CVE-2024-50171 CVE-2024-50175 CVE-2024-50176 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50229 CVE-2024-50233 CVE-2024-53104 CVE-2024-53144 CVE-2024-53156 CVE-2024-53165 CVE-2024-53170 CVE-2024-56582 CVE-2024-56614 CVE-2024-56663 CVE-2024-8805 CVE-2025-0927 USN-7395-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7395-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.48.0-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.48.0-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.48.0-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.48.0-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.48.0-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.48.0-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.48.0-0ubuntu0.24.04.1 webkit2gtk-driver - 2.48.0-0ubuntu0.24.04.1 No subscription required High CVE-2024-44192 CVE-2024-54467 CVE-2025-24201 USN-7396-1 -- OVN vulnerability Ubuntu 24.04 LTS Marius Berntsberg, Trygve Vea, Tore Anderson, Rodolfo Alonso, Jay Faulkner, and Brian Haley discovered that OVN incorrectly handled certain crafted UDP packets. A remote attacker could possibly use this issue to bypass egress ACL rules. Update Instructions: Run `sudo pro fix USN-7396-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ovn-central - 24.03.2-0ubuntu0.24.04.2 ovn-common - 24.03.2-0ubuntu0.24.04.2 ovn-controller-vtep - 24.03.2-0ubuntu0.24.04.2 ovn-doc - 24.03.2-0ubuntu0.24.04.2 ovn-docker - 24.03.2-0ubuntu0.24.04.2 ovn-host - 24.03.2-0ubuntu0.24.04.2 ovn-ic - 24.03.2-0ubuntu0.24.04.2 ovn-ic-db - 24.03.2-0ubuntu0.24.04.2 No subscription required Medium CVE-2025-0650 USN-7398-1 -- libtar vulnerabilities Ubuntu 24.04 LTS It was discovered that libtar may perform out-of-bounds reads when processing specially crafted tar files. An attacker could possibly use this issue to cause libtar to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2021-33643, CVE-2021-33644) It was discovered that libtar contained a memory leak due to failing to free a variable, causing performance degradation. An attacker could possibly use this issue to cause libtar to crash, resulting in a denial of service. (CVE-2021-33645, CVE-2021-33646) Update Instructions: Run `sudo pro fix USN-7398-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtar-dev - 1.2.20-8.1ubuntu0.24.04.1 libtar0t64 - 1.2.20-8.1ubuntu0.24.04.1 No subscription required Medium CVE-2021-33643 CVE-2021-33644 CVE-2021-33645 CVE-2021-33646 USN-7399-1 -- RabbitMQ Server vulnerability Ubuntu 24.04 LTS It was discovered that RabbitMQ Server's management UI did not sanitize certain input. An attacker could possibly use this issue to inject code by performing a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-7399-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rabbitmq-server - 3.12.1-1ubuntu1.2 No subscription required Medium CVE-2025-30219 USN-7400-1 -- PHP vulnerabilities Ubuntu 24.04 LTS It was discovered that PHP incorrectly handle certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2024-11235) It was discovered that PHP incorrectly handle certain folded headers. An attacker could possibly use this issue to cause a crash or execute arbritrary code. (CVE-2025-1217) It was discovered that PHP incorrectly handled certain headers. An attacker could possibly use this issue to expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS Ubuntu 24.10, and Ubuntu 24.04 LTS. (CVE-2025-1219) It was discovered that PHP incorrectly handle certain headers with invalid name and no colon. An attacker could possibly use this issue to confuse applications into accepting invalid headers causing code injection. (CVE-2025-1734) It was discovered that PHP incorrectly handled certain headers. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.10, and Ubuntu 24.04 LTS. (CVE-2025-1736) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2025-1861) Update Instructions: Run `sudo pro fix USN-7400-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.4 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.4 php8.3 - 8.3.6-0ubuntu0.24.04.4 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.4 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.4 php8.3-cgi - 8.3.6-0ubuntu0.24.04.4 php8.3-cli - 8.3.6-0ubuntu0.24.04.4 php8.3-common - 8.3.6-0ubuntu0.24.04.4 php8.3-curl - 8.3.6-0ubuntu0.24.04.4 php8.3-dba - 8.3.6-0ubuntu0.24.04.4 php8.3-dev - 8.3.6-0ubuntu0.24.04.4 php8.3-enchant - 8.3.6-0ubuntu0.24.04.4 php8.3-fpm - 8.3.6-0ubuntu0.24.04.4 php8.3-gd - 8.3.6-0ubuntu0.24.04.4 php8.3-gmp - 8.3.6-0ubuntu0.24.04.4 php8.3-imap - 8.3.6-0ubuntu0.24.04.4 php8.3-interbase - 8.3.6-0ubuntu0.24.04.4 php8.3-intl - 8.3.6-0ubuntu0.24.04.4 php8.3-ldap - 8.3.6-0ubuntu0.24.04.4 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.4 php8.3-mysql - 8.3.6-0ubuntu0.24.04.4 php8.3-odbc - 8.3.6-0ubuntu0.24.04.4 php8.3-opcache - 8.3.6-0ubuntu0.24.04.4 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.4 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.4 php8.3-pspell - 8.3.6-0ubuntu0.24.04.4 php8.3-readline - 8.3.6-0ubuntu0.24.04.4 php8.3-snmp - 8.3.6-0ubuntu0.24.04.4 php8.3-soap - 8.3.6-0ubuntu0.24.04.4 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.4 php8.3-sybase - 8.3.6-0ubuntu0.24.04.4 php8.3-tidy - 8.3.6-0ubuntu0.24.04.4 php8.3-xml - 8.3.6-0ubuntu0.24.04.4 php8.3-xsl - 8.3.6-0ubuntu0.24.04.4 php8.3-zip - 8.3.6-0ubuntu0.24.04.4 No subscription required Medium CVE-2024-11235 CVE-2025-1217 CVE-2025-1219 CVE-2025-1734 CVE-2025-1736 CVE-2025-1861 USN-7402-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-cloud-tools-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-cloud-tools-gkeop - 6.8.0-1009.11 linux-cloud-tools-gkeop-6.8 - 6.8.0-1009.11 linux-gkeop - 6.8.0-1009.11 linux-gkeop-6.8 - 6.8.0-1009.11 linux-gkeop-cloud-tools-6.8.0-1009 - 6.8.0-1009.11 linux-gkeop-headers-6.8.0-1009 - 6.8.0-1009.11 linux-gkeop-tools-6.8.0-1009 - 6.8.0-1009.11 linux-headers-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-headers-gkeop - 6.8.0-1009.11 linux-headers-gkeop-6.8 - 6.8.0-1009.11 linux-image-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-image-gkeop - 6.8.0-1009.11 linux-image-gkeop-6.8 - 6.8.0-1009.11 linux-image-unsigned-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-extra-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-modules-extra-gkeop - 6.8.0-1009.11 linux-modules-extra-gkeop-6.8 - 6.8.0-1009.11 linux-tools-6.8.0-1009-gkeop - 6.8.0-1009.11 linux-tools-gkeop - 6.8.0-1009.11 linux-tools-gkeop-6.8 - 6.8.0-1009.11 No subscription required linux-buildinfo-6.8.0-1022-gke - 6.8.0-1022.26 linux-gke - 6.8.0-1022.26 linux-gke-headers-6.8.0-1022 - 6.8.0-1022.26 linux-gke-tools-6.8.0-1022 - 6.8.0-1022.26 linux-headers-6.8.0-1022-gke - 6.8.0-1022.26 linux-headers-gke - 6.8.0-1022.26 linux-image-6.8.0-1022-gke - 6.8.0-1022.26 linux-image-gke - 6.8.0-1022.26 linux-image-unsigned-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-extra-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-iwlwifi-6.8.0-1022-gke - 6.8.0-1022.26 linux-modules-iwlwifi-gke - 6.8.0-1022.26 linux-tools-6.8.0-1022-gke - 6.8.0-1022.26 linux-tools-gke - 6.8.0-1022.26 No subscription required linux-buildinfo-6.8.0-1023-ibm - 6.8.0-1023.23 linux-headers-6.8.0-1023-ibm - 6.8.0-1023.23 linux-headers-ibm - 6.8.0-1023.23 linux-headers-ibm-classic - 6.8.0-1023.23 linux-headers-ibm-lts-24.04 - 6.8.0-1023.23 linux-ibm - 6.8.0-1023.23 linux-ibm-classic - 6.8.0-1023.23 linux-ibm-headers-6.8.0-1023 - 6.8.0-1023.23 linux-ibm-lts-24.04 - 6.8.0-1023.23 linux-ibm-tools-6.8.0-1023 - 6.8.0-1023.23 linux-image-6.8.0-1023-ibm - 6.8.0-1023.23 linux-image-ibm - 6.8.0-1023.23 linux-image-ibm-classic - 6.8.0-1023.23 linux-image-ibm-lts-24.04 - 6.8.0-1023.23 linux-image-unsigned-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-extra-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-6.8.0-1023-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-ibm - 6.8.0-1023.23 linux-modules-iwlwifi-ibm-classic - 6.8.0-1023.23 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1023.23 linux-tools-6.8.0-1023-ibm - 6.8.0-1023.23 linux-tools-ibm - 6.8.0-1023.23 linux-tools-ibm-classic - 6.8.0-1023.23 linux-tools-ibm-lts-24.04 - 6.8.0-1023.23 No subscription required linux-buildinfo-6.8.0-1023-oracle - 6.8.0-1023.24 linux-buildinfo-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-headers-6.8.0-1023-oracle - 6.8.0-1023.24 linux-headers-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-headers-oracle - 6.8.0-1023.24 linux-headers-oracle-64k - 6.8.0-1023.24 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-headers-oracle-lts-24.04 - 6.8.0-1023.24 linux-image-6.8.0-1023-oracle - 6.8.0-1023.24 linux-image-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-image-oracle - 6.8.0-1023.24 linux-image-oracle-64k - 6.8.0-1023.24 linux-image-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-image-oracle-lts-24.04 - 6.8.0-1023.24 linux-image-unsigned-6.8.0-1023-oracle - 6.8.0-1023.24 linux-image-unsigned-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-modules-6.8.0-1023-oracle - 6.8.0-1023.24 linux-modules-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-modules-extra-6.8.0-1023-oracle - 6.8.0-1023.24 linux-modules-extra-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-oracle - 6.8.0-1023.24 linux-oracle-64k - 6.8.0-1023.24 linux-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-oracle-headers-6.8.0-1023 - 6.8.0-1023.24 linux-oracle-lts-24.04 - 6.8.0-1023.24 linux-oracle-tools-6.8.0-1023 - 6.8.0-1023.24 linux-tools-6.8.0-1023-oracle - 6.8.0-1023.24 linux-tools-6.8.0-1023-oracle-64k - 6.8.0-1023.24 linux-tools-oracle - 6.8.0-1023.24 linux-tools-oracle-64k - 6.8.0-1023.24 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1023.24 linux-tools-oracle-lts-24.04 - 6.8.0-1023.24 No subscription required linux-buildinfo-6.8.0-1025-oem - 6.8.0-1025.25 linux-headers-6.8.0-1025-oem - 6.8.0-1025.25 linux-headers-oem-24.04 - 6.8.0-1025.25 linux-headers-oem-24.04a - 6.8.0-1025.25 linux-image-6.8.0-1025-oem - 6.8.0-1025.25 linux-image-oem-24.04 - 6.8.0-1025.25 linux-image-oem-24.04a - 6.8.0-1025.25 linux-image-uc-6.8.0-1025-oem - 6.8.0-1025.25 linux-image-uc-oem-24.04 - 6.8.0-1025.25 linux-image-uc-oem-24.04a - 6.8.0-1025.25 linux-image-unsigned-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-ipu6-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-ipu6-oem-24.04 - 6.8.0-1025.25 linux-modules-ipu6-oem-24.04a - 6.8.0-1025.25 linux-modules-iwlwifi-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1025.25 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1025.25 linux-modules-usbio-6.8.0-1025-oem - 6.8.0-1025.25 linux-modules-usbio-oem-24.04 - 6.8.0-1025.25 linux-modules-usbio-oem-24.04a - 6.8.0-1025.25 linux-oem-24.04 - 6.8.0-1025.25 linux-oem-24.04a - 6.8.0-1025.25 linux-oem-6.8-headers-6.8.0-1025 - 6.8.0-1025.25 linux-oem-6.8-tools-6.8.0-1025 - 6.8.0-1025.25 linux-tools-6.8.0-1025-oem - 6.8.0-1025.25 linux-tools-oem-24.04 - 6.8.0-1025.25 linux-tools-oem-24.04a - 6.8.0-1025.25 No subscription required linux-aws - 6.8.0-1026.28 linux-aws-cloud-tools-6.8.0-1026 - 6.8.0-1026.28 linux-aws-headers-6.8.0-1026 - 6.8.0-1026.28 linux-aws-lts-24.04 - 6.8.0-1026.28 linux-aws-tools-6.8.0-1026 - 6.8.0-1026.28 linux-buildinfo-6.8.0-1026-aws - 6.8.0-1026.28 linux-cloud-tools-6.8.0-1026-aws - 6.8.0-1026.28 linux-headers-6.8.0-1026-aws - 6.8.0-1026.28 linux-headers-aws - 6.8.0-1026.28 linux-headers-aws-lts-24.04 - 6.8.0-1026.28 linux-image-6.8.0-1026-aws - 6.8.0-1026.28 linux-image-aws - 6.8.0-1026.28 linux-image-aws-lts-24.04 - 6.8.0-1026.28 linux-image-unsigned-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-extra-6.8.0-1026-aws - 6.8.0-1026.28 linux-modules-extra-aws - 6.8.0-1026.28 linux-modules-extra-aws-lts-24.04 - 6.8.0-1026.28 linux-tools-6.8.0-1026-aws - 6.8.0-1026.28 linux-tools-aws - 6.8.0-1026.28 linux-tools-aws-lts-24.04 - 6.8.0-1026.28 No subscription required linux-buildinfo-6.8.0-1027-gcp - 6.8.0-1027.29 linux-buildinfo-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-gcp - 6.8.0-1027.29 linux-gcp-64k - 6.8.0-1027.29 linux-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-gcp-headers-6.8.0-1027 - 6.8.0-1027.29 linux-gcp-lts-24.04 - 6.8.0-1027.29 linux-gcp-tools-6.8.0-1027 - 6.8.0-1027.29 linux-headers-6.8.0-1027-gcp - 6.8.0-1027.29 linux-headers-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-headers-gcp - 6.8.0-1027.29 linux-headers-gcp-64k - 6.8.0-1027.29 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-headers-gcp-lts-24.04 - 6.8.0-1027.29 linux-image-6.8.0-1027-gcp - 6.8.0-1027.29 linux-image-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-image-gcp - 6.8.0-1027.29 linux-image-gcp-64k - 6.8.0-1027.29 linux-image-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-image-gcp-lts-24.04 - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-gcp - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-6.8.0-1027-gcp - 6.8.0-1027.29 linux-modules-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-gcp - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-modules-extra-gcp - 6.8.0-1027.29 linux-modules-extra-gcp-64k - 6.8.0-1027.29 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1027.29 linux-tools-6.8.0-1027-gcp - 6.8.0-1027.29 linux-tools-6.8.0-1027-gcp-64k - 6.8.0-1027.29 linux-tools-gcp - 6.8.0-1027.29 linux-tools-gcp-64k - 6.8.0-1027.29 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1027.29 linux-tools-gcp-lts-24.04 - 6.8.0-1027.29 No subscription required linux-bpf-dev - 6.8.0-57.59 linux-buildinfo-6.8.0-57-generic - 6.8.0-57.59 linux-buildinfo-6.8.0-57-generic-64k - 6.8.0-57.59 linux-cloud-tools-6.8.0-57 - 6.8.0-57.59 linux-cloud-tools-6.8.0-57-generic - 6.8.0-57.59 linux-cloud-tools-common - 6.8.0-57.59 linux-cloud-tools-generic - 6.8.0-57.59 linux-cloud-tools-virtual - 6.8.0-57.59 linux-crashdump - 6.8.0-57.59 linux-doc - 6.8.0-57.59 linux-generic - 6.8.0-57.59 linux-generic-64k - 6.8.0-57.59 linux-generic-lpae - 6.8.0-57.59 linux-headers-6.8.0-57 - 6.8.0-57.59 linux-headers-6.8.0-57-generic - 6.8.0-57.59 linux-headers-6.8.0-57-generic-64k - 6.8.0-57.59 linux-headers-generic - 6.8.0-57.59 linux-headers-generic-64k - 6.8.0-57.59 linux-headers-generic-lpae - 6.8.0-57.59 linux-headers-kvm - 6.8.0-57.59 linux-headers-laptop-23.10 - 6.8.0-57.59 linux-headers-oem-20.04 - 6.8.0-57.59 linux-headers-oem-20.04b - 6.8.0-57.59 linux-headers-oem-20.04c - 6.8.0-57.59 linux-headers-oem-20.04d - 6.8.0-57.59 linux-headers-oem-22.04 - 6.8.0-57.59 linux-headers-virtual - 6.8.0-57.59 linux-image-6.8.0-57-generic - 6.8.0-57.59 linux-image-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-extra-virtual - 6.8.0-57.59 linux-image-generic - 6.8.0-57.59 linux-image-generic-64k - 6.8.0-57.59 linux-image-generic-lpae - 6.8.0-57.59 linux-image-kvm - 6.8.0-57.59 linux-image-laptop-23.10 - 6.8.0-57.59 linux-image-oem-20.04 - 6.8.0-57.59 linux-image-oem-20.04b - 6.8.0-57.59 linux-image-oem-20.04c - 6.8.0-57.59 linux-image-oem-20.04d - 6.8.0-57.59 linux-image-oem-22.04 - 6.8.0-57.59 linux-image-uc-6.8.0-57-generic - 6.8.0-57.59 linux-image-uc-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-uc-generic - 6.8.0-57.59 linux-image-unsigned-6.8.0-57-generic - 6.8.0-57.59 linux-image-unsigned-6.8.0-57-generic-64k - 6.8.0-57.59 linux-image-virtual - 6.8.0-57.59 linux-kvm - 6.8.0-57.59 linux-laptop-23.10 - 6.8.0-57.59 linux-lib-rust-6.8.0-57-generic - 6.8.0-57.59 linux-libc-dev - 6.8.0-57.59 linux-modules-6.8.0-57-generic - 6.8.0-57.59 linux-modules-6.8.0-57-generic-64k - 6.8.0-57.59 linux-modules-extra-6.8.0-57-generic - 6.8.0-57.59 linux-modules-ipu6-6.8.0-57-generic - 6.8.0-57.59 linux-modules-ipu6-generic - 6.8.0-57.59 linux-modules-iwlwifi-6.8.0-57-generic - 6.8.0-57.59 linux-modules-iwlwifi-generic - 6.8.0-57.59 linux-modules-iwlwifi-oem-20.04 - 6.8.0-57.59 linux-modules-iwlwifi-oem-20.04d - 6.8.0-57.59 linux-modules-iwlwifi-oem-22.04 - 6.8.0-57.59 linux-modules-usbio-6.8.0-57-generic - 6.8.0-57.59 linux-modules-usbio-generic - 6.8.0-57.59 linux-oem-20.04 - 6.8.0-57.59 linux-oem-20.04b - 6.8.0-57.59 linux-oem-20.04c - 6.8.0-57.59 linux-oem-20.04d - 6.8.0-57.59 linux-oem-22.04 - 6.8.0-57.59 linux-source - 6.8.0-57.59 linux-source-6.8.0 - 6.8.0-57.59 linux-tools-6.8.0-57 - 6.8.0-57.59 linux-tools-6.8.0-57-generic - 6.8.0-57.59 linux-tools-6.8.0-57-generic-64k - 6.8.0-57.59 linux-tools-common - 6.8.0-57.59 linux-tools-generic - 6.8.0-57.59 linux-tools-generic-64k - 6.8.0-57.59 linux-tools-generic-lpae - 6.8.0-57.59 linux-tools-host - 6.8.0-57.59 linux-tools-kvm - 6.8.0-57.59 linux-tools-laptop-23.10 - 6.8.0-57.59 linux-tools-oem-20.04 - 6.8.0-57.59 linux-tools-oem-20.04b - 6.8.0-57.59 linux-tools-oem-20.04c - 6.8.0-57.59 linux-tools-oem-20.04d - 6.8.0-57.59 linux-tools-oem-22.04 - 6.8.0-57.59 linux-tools-virtual - 6.8.0-57.59 linux-virtual - 6.8.0-57.59 No subscription required linux-buildinfo-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-buildinfo-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-cloud-tools-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-cloud-tools-lowlatency - 6.8.0-57.59.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-headers-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-headers-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-headers-lowlatency - 6.8.0-57.59.1 linux-headers-lowlatency-64k - 6.8.0-57.59.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-image-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-image-lowlatency - 6.8.0-57.59.1 linux-image-lowlatency-64k - 6.8.0-57.59.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-image-unsigned-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-image-unsigned-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-lowlatency - 6.8.0-57.59.1 linux-lowlatency-64k - 6.8.0-57.59.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-lowlatency-cloud-tools-6.8.0-57 - 6.8.0-57.59.1 linux-lowlatency-headers-6.8.0-57 - 6.8.0-57.59.1 linux-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 linux-lowlatency-lib-rust-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-lowlatency-tools-6.8.0-57 - 6.8.0-57.59.1 linux-modules-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-modules-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-modules-iwlwifi-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-modules-iwlwifi-lowlatency - 6.8.0-57.59.1 linux-tools-6.8.0-57-lowlatency - 6.8.0-57.59.1 linux-tools-6.8.0-57-lowlatency-64k - 6.8.0-57.59.1 linux-tools-lowlatency - 6.8.0-57.59.1 linux-tools-lowlatency-64k - 6.8.0-57.59.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-57.59.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-57.59.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-57.59.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-57.59.1 No subscription required High CVE-2024-50302 CVE-2024-53063 CVE-2024-53140 CVE-2024-56595 CVE-2024-56598 CVE-2024-56658 CVE-2024-56672 CVE-2024-57798 USN-7402-2 -- Linux kernel (Real-time) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1019-realtime - 6.8.1-1019.20 linux-cloud-tools-6.8.1-1019-realtime - 6.8.1-1019.20 linux-headers-6.8.1-1019-realtime - 6.8.1-1019.20 linux-headers-realtime - 6.8.1-1019.20 linux-headers-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-6.8.1-1019-realtime - 6.8.1-1019.20 linux-image-realtime - 6.8.1-1019.20 linux-image-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-uc-6.8.1-1019-realtime - 6.8.1-1019.20 linux-image-uc-realtime - 6.8.1-1019.20 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1019.20 linux-image-unsigned-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-extra-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-6.8.1-1019-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-realtime - 6.8.1-1019.20 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1019.20 linux-realtime - 6.8.1-1019.20 linux-realtime-cloud-tools-6.8.1-1019 - 6.8.1-1019.20 linux-realtime-headers-6.8.1-1019 - 6.8.1-1019.20 linux-realtime-hwe-24.04 - 6.8.1-1019.20 linux-realtime-tools-6.8.1-1019 - 6.8.1-1019.20 linux-tools-6.8.1-1019-realtime - 6.8.1-1019.20 linux-tools-realtime - 6.8.1-1019.20 linux-tools-realtime-hwe-24.04 - 6.8.1-1019.20 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-50302 CVE-2024-53063 CVE-2024-53140 CVE-2024-56595 CVE-2024-56598 CVE-2024-56658 CVE-2024-56672 CVE-2024-57798 USN-7402-3 -- Linux kernel (NVIDIA) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-buildinfo-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-cloud-tools-nvidia - 6.8.0-1025.28 linux-headers-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-headers-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-headers-nvidia - 6.8.0-1025.28 linux-headers-nvidia-64k - 6.8.0-1025.28 linux-image-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-image-nvidia - 6.8.0-1025.28 linux-image-nvidia-64k - 6.8.0-1025.28 linux-image-uc-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-uc-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-extra-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-modules-nvidia-fs-nvidia - 6.8.0-1025.28 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1025.28 linux-nvidia - 6.8.0-1025.28 linux-nvidia-64k - 6.8.0-1025.28 linux-nvidia-headers-6.8.0-1025 - 6.8.0-1025.28 linux-nvidia-tools-6.8.0-1025 - 6.8.0-1025.28 linux-tools-6.8.0-1025-nvidia - 6.8.0-1025.28 linux-tools-6.8.0-1025-nvidia-64k - 6.8.0-1025.28 linux-tools-nvidia - 6.8.0-1025.28 linux-tools-nvidia-64k - 6.8.0-1025.28 No subscription required High CVE-2024-50302 CVE-2024-53063 CVE-2024-53140 CVE-2024-56595 CVE-2024-56598 CVE-2024-56658 CVE-2024-56672 CVE-2024-57798 USN-7402-4 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063) Update Instructions: Run `sudo pro fix USN-7402-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-buildinfo-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-headers-nvidia-lowlatency - 6.8.0-1025.28.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-uc-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-uc-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-image-unsigned-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-image-unsigned-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-extra-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1025.28.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-nvidia-lowlatency - 6.8.0-1025.28.1 linux-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-nvidia-lowlatency-headers-6.8.0-1025 - 6.8.0-1025.28.1 linux-nvidia-lowlatency-tools-6.8.0-1025 - 6.8.0-1025.28.1 linux-tools-6.8.0-1025-nvidia-lowlatency - 6.8.0-1025.28.1 linux-tools-6.8.0-1025-nvidia-lowlatency-64k - 6.8.0-1025.28.1 linux-tools-nvidia-lowlatency - 6.8.0-1025.28.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1025.28.1 No subscription required linux-azure-cloud-tools-6.8.0-1026 - 6.8.0-1026.31 linux-azure-fde-lts-24.04 - 6.8.0-1026.31 linux-azure-headers-6.8.0-1026 - 6.8.0-1026.31 linux-azure-lts-24.04 - 6.8.0-1026.31 linux-azure-tools-6.8.0-1026 - 6.8.0-1026.31 linux-buildinfo-6.8.0-1026-azure - 6.8.0-1026.31 linux-cloud-tools-6.8.0-1026-azure - 6.8.0-1026.31 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1026.31 linux-headers-6.8.0-1026-azure - 6.8.0-1026.31 linux-headers-azure-lts-24.04 - 6.8.0-1026.31 linux-image-6.8.0-1026-azure - 6.8.0-1026.31 linux-image-6.8.0-1026-azure-fde - 6.8.0-1026.31 linux-image-azure-fde-lts-24.04 - 6.8.0-1026.31 linux-image-azure-lts-24.04 - 6.8.0-1026.31 linux-image-unsigned-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-extra-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-extra-azure-lts-24.04 - 6.8.0-1026.31 linux-modules-involflt-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1026.31 linux-modules-iwlwifi-6.8.0-1026-azure - 6.8.0-1026.31 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1026.31 linux-tools-6.8.0-1026-azure - 6.8.0-1026.31 linux-tools-azure-lts-24.04 - 6.8.0-1026.31 No subscription required High CVE-2024-50302 CVE-2024-53063 CVE-2024-53140 CVE-2024-56595 CVE-2024-56598 CVE-2024-56658 CVE-2024-56672 CVE-2024-57798 USN-7409-1 -- RubySAML vulnerabilities Ubuntu 24.04 LTS It was discovered that ruby-saml did not correctly handle XML parsing. An attacker could possibly use this issue to perform a signature wrapping attack and bypass authentication. (CVE-2025-25291 and CVE-2025-25292) It was discovered that ruby-saml did not correctly handle decompressing SAML responses. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-25293) Update Instructions: Run `sudo pro fix USN-7409-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-saml - 1.15.0-1ubuntu0.24.04.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2025-25291 CVE-2025-25292 CVE-2025-25293 USN-7411-1 -- OpenVPN vulnerability Ubuntu 24.04 LTS It was discovered that OpenVPN incorrectly handled certain malformed packets. A remote attacker could possibly use this issue to cause OpenVPN to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7411-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.12-0ubuntu0.24.04.3 No subscription required Medium CVE-2025-2704 USN-7412-1 -- GnuPG vulnerability Ubuntu 24.04 LTS It was discovered that GnuPG incorrectly handled importing keys with certain crafted subkey data. If a user or automated system were tricked into importing a specially crafted key, a remote attacker may prevent users from importing other keys in the future. Update Instructions: Run `sudo pro fix USN-7412-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr - 2.4.4-2ubuntu17.2 gnupg - 2.4.4-2ubuntu17.2 gnupg-agent - 2.4.4-2ubuntu17.2 gnupg-l10n - 2.4.4-2ubuntu17.2 gnupg-utils - 2.4.4-2ubuntu17.2 gnupg2 - 2.4.4-2ubuntu17.2 gpg - 2.4.4-2ubuntu17.2 gpg-agent - 2.4.4-2ubuntu17.2 gpg-wks-client - 2.4.4-2ubuntu17.2 gpg-wks-server - 2.4.4-2ubuntu17.2 gpgconf - 2.4.4-2ubuntu17.2 gpgsm - 2.4.4-2ubuntu17.2 gpgv - 2.4.4-2ubuntu17.2 gpgv-static - 2.4.4-2ubuntu17.2 gpgv-win32 - 2.4.4-2ubuntu17.2 keyboxd - 2.4.4-2ubuntu17.2 scdaemon - 2.4.4-2ubuntu17.2 No subscription required Medium CVE-2025-30258 USN-7414-1 -- XZ Utils vulnerability Ubuntu 24.04 LTS Harri K. Koskinen discovered that XZ Utils incorrectly handled the threaded xz decoder. If a user or automated system were tricked into processing an xz file, a remote attacker could use this issue to cause XZ Utils to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7414-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liblzma-dev - 5.6.1+really5.4.5-1ubuntu0.2 liblzma-doc - 5.6.1+really5.4.5-1ubuntu0.2 liblzma5 - 5.6.1+really5.4.5-1ubuntu0.2 xz-utils - 5.6.1+really5.4.5-1ubuntu0.2 xzdec - 5.6.1+really5.4.5-1ubuntu0.2 No subscription required Medium CVE-2025-31115 USN-7418-1 -- Ruby vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123, CVE-2024-43398) It was discovered that Ruby incorrectly handled expanding ranges in the net-imap response parser. If a user or automated system were tricked into connecting to a malicious IMAP server, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-25186) It was discovered that the Ruby CGI gem incorrectly handled parsing certain cookies. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27219) It was discovered that the Ruby CGI gem incorrectly handled parsing certain regular expressions. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27220) It was discovered that the Ruby URI gem incorrectly handled certain URI handling methods. A remote attacker could possibly use this issue to leak authentication credentials. (CVE-2025-27221) Update Instructions: Run `sudo pro fix USN-7418-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.2 - 3.2.3-1ubuntu0.24.04.5 ruby3.2 - 3.2.3-1ubuntu0.24.04.5 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.5 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.5 No subscription required Medium CVE-2024-35176 CVE-2024-39908 CVE-2024-41123 CVE-2024-43398 CVE-2025-25186 CVE-2025-27219 CVE-2025-27220 CVE-2025-27221 USN-7419-1 -- Vim vulnerabilities Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when using invalid input with the log option. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1215) It was discovered that Vim incorrectly handled memory when redirecting certain output to the register. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-26603) Update Instructions: Run `sudo pro fix USN-7419-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.8 vim-athena - 2:9.1.0016-1ubuntu7.8 vim-common - 2:9.1.0016-1ubuntu7.8 vim-doc - 2:9.1.0016-1ubuntu7.8 vim-gtk3 - 2:9.1.0016-1ubuntu7.8 vim-gui-common - 2:9.1.0016-1ubuntu7.8 vim-motif - 2:9.1.0016-1ubuntu7.8 vim-nox - 2:9.1.0016-1ubuntu7.8 vim-runtime - 2:9.1.0016-1ubuntu7.8 vim-tiny - 2:9.1.0016-1ubuntu7.8 xxd - 2:9.1.0016-1ubuntu7.8 No subscription required Medium CVE-2025-1215 CVE-2025-26603 USN-7423-1 -- GNU binutils vulnerabilities Ubuntu 24.04 LTS It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. (CVE-2025-1153, CVE-2025-1182) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-1176) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-1178, CVE-2025-1181) Update Instructions: Run `sudo pro fix USN-7423-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.42-4ubuntu2.5 binutils-aarch64-linux-gnu - 2.42-4ubuntu2.5 binutils-alpha-linux-gnu - 2.42-4ubuntu2.5 binutils-arc-linux-gnu - 2.42-4ubuntu2.5 binutils-arm-linux-gnueabi - 2.42-4ubuntu2.5 binutils-arm-linux-gnueabihf - 2.42-4ubuntu2.5 binutils-common - 2.42-4ubuntu2.5 binutils-dev - 2.42-4ubuntu2.5 binutils-doc - 2.42-4ubuntu2.5 binutils-for-build - 2.42-4ubuntu2.5 binutils-for-host - 2.42-4ubuntu2.5 binutils-hppa-linux-gnu - 2.42-4ubuntu2.5 binutils-hppa64-linux-gnu - 2.42-4ubuntu2.5 binutils-i686-gnu - 2.42-4ubuntu2.5 binutils-i686-kfreebsd-gnu - 2.42-4ubuntu2.5 binutils-i686-linux-gnu - 2.42-4ubuntu2.5 binutils-ia64-linux-gnu - 2.42-4ubuntu2.5 binutils-loongarch64-linux-gnu - 2.42-4ubuntu2.5 binutils-m68k-linux-gnu - 2.42-4ubuntu2.5 binutils-multiarch - 2.42-4ubuntu2.5 binutils-multiarch-dev - 2.42-4ubuntu2.5 binutils-powerpc-linux-gnu - 2.42-4ubuntu2.5 binutils-powerpc64-linux-gnu - 2.42-4ubuntu2.5 binutils-powerpc64le-linux-gnu - 2.42-4ubuntu2.5 binutils-riscv64-linux-gnu - 2.42-4ubuntu2.5 binutils-s390x-linux-gnu - 2.42-4ubuntu2.5 binutils-sh4-linux-gnu - 2.42-4ubuntu2.5 binutils-source - 2.42-4ubuntu2.5 binutils-sparc64-linux-gnu - 2.42-4ubuntu2.5 binutils-x86-64-gnu - 2.42-4ubuntu2.5 binutils-x86-64-kfreebsd-gnu - 2.42-4ubuntu2.5 binutils-x86-64-linux-gnu - 2.42-4ubuntu2.5 binutils-x86-64-linux-gnux32 - 2.42-4ubuntu2.5 libbinutils - 2.42-4ubuntu2.5 libctf-nobfd0 - 2.42-4ubuntu2.5 libctf0 - 2.42-4ubuntu2.5 libgprofng0 - 2.42-4ubuntu2.5 libsframe1 - 2.42-4ubuntu2.5 No subscription required Medium CVE-2025-1153 CVE-2025-1176 CVE-2025-1178 CVE-2025-1181 CVE-2025-1182 USN-7424-1 -- Expat vulnerability Ubuntu 24.04 LTS It was discovered that Expat could crash due to stack overflow when processing XML documents with deeply nested entity references. If a user or automated system were tricked into processing specially crafted XML input, an attacker could use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7424-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.3 libexpat1 - 2.6.1-2ubuntu0.3 libexpat1-dev - 2.6.1-2ubuntu0.3 No subscription required Medium CVE-2024-8176 USN-7425-1 -- Erlang vulnerability Ubuntu 24.04 LTS It was discovered that Erlang OTP's SSH module did not limit the size of certain data in initialization messages. An attacker could possibly use this issue to consume large amount of memory leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7425-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.2 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.2 No subscription required Medium CVE-2025-30211 USN-7426-1 -- poppler vulnerabilities Ubuntu 24.04 LTS It was discovered that poppler incorrectly handled memory when opening certain PDF files. An attacker could possibly use this issue to cause poppler to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7426-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.3 libpoppler-cpp-dev - 24.02.0-1ubuntu9.3 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.3 libpoppler-dev - 24.02.0-1ubuntu9.3 libpoppler-glib-dev - 24.02.0-1ubuntu9.3 libpoppler-glib-doc - 24.02.0-1ubuntu9.3 libpoppler-glib8t64 - 24.02.0-1ubuntu9.3 libpoppler-private-dev - 24.02.0-1ubuntu9.3 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.3 libpoppler-qt5-dev - 24.02.0-1ubuntu9.3 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.3 libpoppler-qt6-dev - 24.02.0-1ubuntu9.3 libpoppler134 - 24.02.0-1ubuntu9.3 poppler-utils - 24.02.0-1ubuntu9.3 No subscription required Medium CVE-2025-32364 CVE-2025-32365 USN-7427-1 -- .NET vulnerability Ubuntu 24.04 LTS James Newton-King discovered that .NET did not properly limit resource allocation when handling certain HTTP/3 requests. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7427-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.115-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.115-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.115-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.115-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.115-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.115-8.0.15-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.15-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.15-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.15-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.15-0ubuntu1~24.04.1 No subscription required Medium CVE-2025-26682 USN-7431-1 -- HAProxy vulnerability Ubuntu 24.04 LTS Aleandro Prudenzano and Edoardo Geraci discovered that HAProxy incorrectly handled certain uncommon configurations that replace multiple short patterns with a longer one. A remote attacker could use this issue to cause HAProxy to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7431-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: haproxy - 2.8.5-1ubuntu3.3 haproxy-doc - 2.8.5-1ubuntu3.3 vim-haproxy - 2.8.5-1ubuntu3.3 No subscription required Medium CVE-2025-32464 USN-7432-1 -- libsoup vulnerabilities Ubuntu 24.04 LTS It was discovered that libsoup could be made to read out of bounds. An attacker could possibly use this issue to cause applications using libsoup to crash, resulting in a denial of service. (CVE-2025-2784, CVE-2025-32050, CVE-2025-32052, CVE-2025-32053) It was discovered that libsoup could be made to dereference invalid memory. An attacker could possibly use this issue to cause applications using libsoup to crash, resulting in a denial of service. (CVE-2025-32051) Update Instructions: Run `sudo pro fix USN-7432-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.2 libsoup-2.4-1 - 2.74.3-6ubuntu1.2 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.2 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.2 libsoup2.4-common - 2.74.3-6ubuntu1.2 libsoup2.4-dev - 2.74.3-6ubuntu1.2 libsoup2.4-doc - 2.74.3-6ubuntu1.2 libsoup2.4-tests - 2.74.3-6ubuntu1.2 No subscription required gir1.2-soup-3.0 - 3.4.4-5ubuntu0.2 libsoup-3.0-0 - 3.4.4-5ubuntu0.2 libsoup-3.0-common - 3.4.4-5ubuntu0.2 libsoup-3.0-dev - 3.4.4-5ubuntu0.2 libsoup-3.0-doc - 3.4.4-5ubuntu0.2 libsoup-3.0-tests - 3.4.4-5ubuntu0.2 No subscription required Medium CVE-2025-2784 CVE-2025-32050 CVE-2025-32051 CVE-2025-32052 CVE-2025-32053 USN-7433-1 -- GraphicsMagick vulnerabilities Ubuntu 24.04 LTS It was discovered that GraphicsMagick did not properly limit image dimensions, which could lead to excessive memory consumption. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-27795) It was discovered that GraphicsMagick did not properly handle certain memory operations, which could lead to a out-of-bounds memory access. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 24.10. (CVE-2025-27796) Update Instructions: Run `sudo pro fix USN-7433-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: graphicsmagick - 1.4+really1.3.42-1.1ubuntu0.1~esm1 graphicsmagick-imagemagick-compat - 1.4+really1.3.42-1.1ubuntu0.1~esm1 graphicsmagick-libmagick-dev-compat - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphics-magick-perl - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick++-q16-12t64 - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick++1-dev - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick-q16-3t64 - 1.4+really1.3.42-1.1ubuntu0.1~esm1 libgraphicsmagick1-dev - 1.4+really1.3.42-1.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2025-27795 CVE-2025-27796 USN-7434-1 -- Perl vulnerability Ubuntu 24.04 LTS It was discovered that Perl incorrectly handled transliterating non-ASCII bytes. A remote attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7434-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libperl-dev - 5.38.2-3.2ubuntu0.1 libperl5.38t64 - 5.38.2-3.2ubuntu0.1 perl - 5.38.2-3.2ubuntu0.1 perl-base - 5.38.2-3.2ubuntu0.1 perl-debug - 5.38.2-3.2ubuntu0.1 perl-doc - 5.38.2-3.2ubuntu0.1 perl-modules-5.38 - 5.38.2-3.2ubuntu0.1 No subscription required Medium CVE-2024-56406 USN-7435-1 -- Protocol Buffers vulnerability Ubuntu 24.04 LTS It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7435-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: elpa-protobuf-mode - 3.21.12-8.2ubuntu0.1 libprotobuf-dev - 3.21.12-8.2ubuntu0.1 libprotobuf-java - 3.21.12-8.2ubuntu0.1 libprotobuf-lite32t64 - 3.21.12-8.2ubuntu0.1 libprotobuf32t64 - 3.21.12-8.2ubuntu0.1 libprotoc-dev - 3.21.12-8.2ubuntu0.1 libprotoc32t64 - 3.21.12-8.2ubuntu0.1 php-google-protobuf - 3.21.12-8.2ubuntu0.1 protobuf-compiler - 3.21.12-8.2ubuntu0.1 python3-protobuf - 3.21.12-8.2ubuntu0.1 ruby-google-protobuf - 3.21.12-8.2ubuntu0.1 No subscription required Medium CVE-2024-7254 USN-7436-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-7436-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.48.1-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.48.1-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.48.1-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.48.1-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.48.1-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.48.1-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.48.1-0ubuntu0.24.04.1 webkit2gtk-driver - 2.48.1-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-54551 CVE-2025-24208 CVE-2025-24209 CVE-2025-24213 CVE-2025-24216 CVE-2025-24264 CVE-2025-30427 USN-7437-1 -- CImg library vulnerabilities Ubuntu 24.04 LTS It was discovered that the CImg library did not properly check the size of images before loading them. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1325) It was discovered that the CImg library did not correctly handle certain memory operations, which could lead to a buffer overflow. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-26540) Update Instructions: Run `sudo pro fix USN-7437-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cimg-dev - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 cimg-doc - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 cimg-examples - 3.2.1+dfsg-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-1325 CVE-2024-26540 USN-7438-1 -- 7-Zip vulnerabilities Ubuntu 24.04 LTS Igor Pavlov discovered that 7-Zip had several memory-related issues. An attacker could possibly use these issues to cause 7-Zip to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-52168, CVE-2023-52169) Update Instructions: Run `sudo pro fix USN-7438-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: 7zip - 23.01+dfsg-11ubuntu0.1~esm1 7zip-standalone - 23.01+dfsg-11ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-52168 CVE-2023-52169 USN-7439-1 -- QuickJS vulnerabilities Ubuntu 24.04 LTS It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use this issue to cause QuickJS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-48183) It was discovered that QuickJS incorrectly managed memory in certain circumstances. An attacker could possibly use this issue to exhaust system resources, resulting in a denial of service. (CVE-2023-48184) It was discovered that QuickJS could be forced to crash due to a failing test. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-33263) Update Instructions: Run `sudo pro fix USN-7439-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libquickjs - 2021.03.27-1ubuntu0.1~esm1 quickjs - 2021.03.27-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-48183 CVE-2023-48184 CVE-2024-33263 USN-7441-1 -- Eclipse Mosquitto vulnerabilities Ubuntu 24.04 LTS It was discovered that Eclipse Mosquitto client incorrectly handled memory when receiving a SUBACK packet. An attacker with a malicious broker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-10525) Xiangpu Song discovered that Eclipse Mosquitto broker did not properly manage memory under certain circumstances. A malicious client with a remote connection could possibly use this issue to cause the broker to crash resulting in a denial of service, or another unspecified impact. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3935) Update Instructions: Run `sudo pro fix USN-7441-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmosquitto-dev - 2.0.18-1ubuntu0.1~esm1 libmosquitto1 - 2.0.18-1ubuntu0.1~esm1 libmosquittopp-dev - 2.0.18-1ubuntu0.1~esm1 libmosquittopp1 - 2.0.18-1ubuntu0.1~esm1 mosquitto - 2.0.18-1ubuntu0.1~esm1 mosquitto-clients - 2.0.18-1ubuntu0.1~esm1 mosquitto-dev - 2.0.18-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-10525 CVE-2024-3935 USN-7443-1 -- Erlang vulnerability Ubuntu 24.04 LTS Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, and Jörg Schwenk discovered that Erlang OTP’s SSH module incorrect handled authentication. A remote attacker could use this issue to execute arbitrary commands without authentication, possibly leading to a system compromise. Update Instructions: Run `sudo pro fix USN-7443-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: erlang - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-asn1 - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-base - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-common-test - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-crypto - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-debugger - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-dev - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-dialyzer - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-diameter - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-doc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-edoc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-eldap - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-erl-docgen - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-et - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-eunit - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-examples - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ftp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-inets - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-jinterface - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-manpages - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-megaco - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-mnesia - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-mode - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-nox - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-observer - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-odbc - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-os-mon - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-parsetools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-public-key - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-reltool - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-runtime-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-snmp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-src - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ssh - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-ssl - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-syntax-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-tftp - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-tools - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-wx - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-x11 - 1:25.3.2.8+dfsg-1ubuntu4.3 erlang-xmerl - 1:25.3.2.8+dfsg-1ubuntu4.3 No subscription required High CVE-2025-32433 USN-7445-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21685, CVE-2025-21684, CVE-2025-21756, CVE-2025-21670, CVE-2024-57949, CVE-2025-21677, CVE-2025-21680, CVE-2025-21703, CVE-2024-57952, CVE-2025-21674, CVE-2025-21701, CVE-2025-21691, CVE-2025-21689, CVE-2025-21668, CVE-2025-21665, CVE-2025-21683, CVE-2025-21675, CVE-2025-21672, CVE-2024-57948, CVE-2025-21669, CVE-2025-21673, CVE-2025-21692, CVE-2025-21699, CVE-2025-21702, CVE-2025-21682, CVE-2025-21690, CVE-2025-21681, CVE-2025-21695, CVE-2025-21696, CVE-2025-21700, CVE-2025-21678, CVE-2025-21676, CVE-2024-57950, CVE-2025-21666, CVE-2025-21694, CVE-2025-21693, CVE-2025-21993, CVE-2024-57951, CVE-2025-21697, CVE-2025-21667) Update Instructions: Run `sudo pro fix USN-7445-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-buildinfo-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-cloud-tools-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-headers-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-headers-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-image-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-image-unsigned-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-image-unsigned-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1012 - 6.11.0-1012.13~24.04.1 linux-modules-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-modules-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-tools-6.11.0-1012-lowlatency - 6.11.0-1012.13~24.04.1 linux-tools-6.11.0-1012-lowlatency-64k - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1012.13~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1012.13~24.04.1 No subscription required linux-buildinfo-6.11.0-1020-oem - 6.11.0-1020.20 linux-headers-6.11.0-1020-oem - 6.11.0-1020.20 linux-headers-oem-24.04b - 6.11.0-1020.20 linux-image-6.11.0-1020-oem - 6.11.0-1020.20 linux-image-oem-24.04b - 6.11.0-1020.20 linux-image-uc-6.11.0-1020-oem - 6.11.0-1020.20 linux-image-uc-oem-24.04b - 6.11.0-1020.20 linux-image-unsigned-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu6-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu6-oem-24.04b - 6.11.0-1020.20 linux-modules-ipu7-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-ipu7-oem-24.04b - 6.11.0-1020.20 linux-modules-iwlwifi-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1020.20 linux-modules-usbio-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-usbio-oem-24.04b - 6.11.0-1020.20 linux-modules-vision-6.11.0-1020-oem - 6.11.0-1020.20 linux-modules-vision-oem-24.04b - 6.11.0-1020.20 linux-oem-24.04b - 6.11.0-1020.20 linux-oem-6.11-headers-6.11.0-1020 - 6.11.0-1020.20 linux-oem-6.11-tools-6.11.0-1020 - 6.11.0-1020.20 linux-tools-6.11.0-1020-oem - 6.11.0-1020.20 linux-tools-oem-24.04b - 6.11.0-1020.20 No subscription required linux-buildinfo-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-buildinfo-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-cloud-tools-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-headers-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-hwe-6.11-headers-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-hwe-6.11-tools-6.11.0-24 - 6.11.0-24.24~24.04.1 linux-image-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-uc-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-uc-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-image-unsigned-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-image-unsigned-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-modules-extra-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu6-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-ipu7-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-usbio-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-modules-vision-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-6.11.0-24-generic - 6.11.0-24.24~24.04.1 linux-tools-6.11.0-24-generic-64k - 6.11.0-24.24~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-24.24~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-24.24~24.04.1 No subscription required Medium CVE-2024-57948 CVE-2024-57949 CVE-2024-57950 CVE-2024-57951 CVE-2024-57952 CVE-2025-21665 CVE-2025-21666 CVE-2025-21667 CVE-2025-21668 CVE-2025-21669 CVE-2025-21670 CVE-2025-21672 CVE-2025-21673 CVE-2025-21674 CVE-2025-21675 CVE-2025-21676 CVE-2025-21677 CVE-2025-21678 CVE-2025-21680 CVE-2025-21681 CVE-2025-21682 CVE-2025-21683 CVE-2025-21684 CVE-2025-21685 CVE-2025-21689 CVE-2025-21690 CVE-2025-21691 CVE-2025-21692 CVE-2025-21693 CVE-2025-21694 CVE-2025-21695 CVE-2025-21696 CVE-2025-21697 CVE-2025-21699 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21703 CVE-2025-21756 CVE-2025-21993 USN-7446-1 -- mod_auth_openidc vulnerability Ubuntu 24.04 LTS It was discovered that mod_auth_openidc incorrectly handled certain POST requests. An attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7446-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-auth-openidc - 2.4.15.1-1ubuntu0.1 No subscription required Medium CVE-2025-31492 USN-7447-1 -- Yelp vulnerability Ubuntu 24.04 LTS It was discovered that Yelp incorrectly handled paths in ghelp URLs. A remote attacker could use this issue to trick users into opening malicious downloaded help files and exfiltrate sensitive information. Update Instructions: Run `sudo pro fix USN-7447-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: yelp-xsl - 42.1-2ubuntu0.24.04.1 No subscription required libyelp-dev - 42.2-1ubuntu0.24.04.1 libyelp0 - 42.2-1ubuntu0.24.04.1 yelp - 42.2-1ubuntu0.24.04.1 No subscription required Medium CVE-2025-3155 USN-7448-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21694, CVE-2025-21993, CVE-2025-21684, CVE-2025-21681, CVE-2025-21675, CVE-2025-21672, CVE-2025-21696, CVE-2025-21691, CVE-2025-21683, CVE-2025-21666, CVE-2025-21682, CVE-2025-21697, CVE-2025-21668, CVE-2025-21701, CVE-2025-21670, CVE-2025-21676, CVE-2025-21695, CVE-2025-21692, CVE-2025-21674, CVE-2025-21699, CVE-2024-57948, CVE-2025-21677, CVE-2024-57951, CVE-2025-21702, CVE-2025-21700, CVE-2024-57949, CVE-2025-21669, CVE-2025-21703, CVE-2025-21756, CVE-2025-21667, CVE-2024-57952, CVE-2024-57950, CVE-2025-21685, CVE-2025-21693, CVE-2025-21678, CVE-2025-21665, CVE-2025-21680, CVE-2025-21689, CVE-2025-21690, CVE-2025-21673) Update Instructions: Run `sudo pro fix USN-7448-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1013.13~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-6.11-headers-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-6.11-tools-6.11.0-1013 - 6.11.0-1013.13~24.04.1 linux-azure-edge - 6.11.0-1013.13~24.04.1 linux-azure-fde - 6.11.0-1013.13~24.04.1 linux-azure-fde-edge - 6.11.0-1013.13~24.04.1 linux-buildinfo-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-azure - 6.11.0-1013.13~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1013.13~24.04.1 linux-headers-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-headers-azure - 6.11.0-1013.13~24.04.1 linux-headers-azure-edge - 6.11.0-1013.13~24.04.1 linux-image-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-image-6.11.0-1013-azure-fde - 6.11.0-1013.13~24.04.1 linux-image-azure - 6.11.0-1013.13~24.04.1 linux-image-azure-edge - 6.11.0-1013.13~24.04.1 linux-image-azure-fde - 6.11.0-1013.13~24.04.1 linux-image-azure-fde-edge - 6.11.0-1013.13~24.04.1 linux-image-unsigned-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-azure - 6.11.0-1013.13~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1013.13~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1013.13~24.04.1 linux-tools-6.11.0-1013-azure - 6.11.0-1013.13~24.04.1 linux-tools-azure - 6.11.0-1013.13~24.04.1 linux-tools-azure-edge - 6.11.0-1013.13~24.04.1 No subscription required Medium CVE-2024-57948 CVE-2024-57949 CVE-2024-57950 CVE-2024-57951 CVE-2024-57952 CVE-2025-21665 CVE-2025-21666 CVE-2025-21667 CVE-2025-21668 CVE-2025-21669 CVE-2025-21670 CVE-2025-21672 CVE-2025-21673 CVE-2025-21674 CVE-2025-21675 CVE-2025-21676 CVE-2025-21677 CVE-2025-21678 CVE-2025-21680 CVE-2025-21681 CVE-2025-21682 CVE-2025-21683 CVE-2025-21684 CVE-2025-21685 CVE-2025-21689 CVE-2025-21690 CVE-2025-21691 CVE-2025-21692 CVE-2025-21693 CVE-2025-21694 CVE-2025-21695 CVE-2025-21696 CVE-2025-21697 CVE-2025-21699 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21703 CVE-2025-21756 CVE-2025-21993 CVE-2025-2312 USN-7449-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50288, CVE-2024-56568, CVE-2024-50280, CVE-2024-56677, CVE-2024-56620, CVE-2024-53108, CVE-2024-53115, CVE-2024-53061, CVE-2024-53215, CVE-2024-50275, CVE-2024-53133, CVE-2024-50279, CVE-2025-21831, CVE-2025-21756, CVE-2024-56727, CVE-2024-50208, CVE-2024-50142, CVE-2024-53148, CVE-2024-56781, CVE-2024-53171, CVE-2024-56608, CVE-2024-53177, CVE-2024-56708, CVE-2024-50207, CVE-2024-50278, CVE-2024-50166, CVE-2024-56629, CVE-2024-56723, CVE-2024-50172, CVE-2024-56707, CVE-2024-50051, CVE-2024-56606, CVE-2024-56700, CVE-2024-56599, CVE-2024-53051, CVE-2024-56632, CVE-2024-47143, CVE-2024-53135, CVE-2024-53111, CVE-2024-56634, CVE-2024-50262, CVE-2024-56587, CVE-2024-50125, CVE-2024-53145, CVE-2024-53185, CVE-2024-56575, CVE-2024-53231, CVE-2024-53072, CVE-2024-50110, CVE-2024-53172, CVE-2024-50258, CVE-2024-53226, CVE-2024-50211, CVE-2024-43098, CVE-2024-50224, CVE-2024-56642, CVE-2024-53082, CVE-2024-50108, CVE-2024-53094, CVE-2024-53184, CVE-2024-56648, CVE-2024-50140, CVE-2024-53166, CVE-2024-53090, CVE-2024-50301, CVE-2024-56625, CVE-2024-50230, CVE-2024-56586, CVE-2024-53052, CVE-2024-56574, CVE-2024-53168, CVE-2024-53209, CVE-2024-56640, CVE-2024-49899, CVE-2024-50247, CVE-2024-50150, CVE-2024-53058, CVE-2024-50153, CVE-2024-56689, CVE-2024-50283, CVE-2024-50251, CVE-2024-56578, CVE-2024-50303, CVE-2024-56569, CVE-2024-53134, CVE-2024-50158, CVE-2024-56592, CVE-2024-50300, CVE-2024-57838, CVE-2024-50205, CVE-2024-56562, CVE-2024-57843, CVE-2024-53084, CVE-2024-56532, CVE-2024-50127, CVE-2024-56584, CVE-2024-53196, CVE-2024-56722, CVE-2024-50215, CVE-2022-49034, CVE-2024-47809, CVE-2024-56744, CVE-2024-50121, CVE-2024-53083, CVE-2024-56540, CVE-2024-50209, CVE-2024-56787, CVE-2024-48873, CVE-2024-53221, CVE-2024-56746, CVE-2024-50238, CVE-2024-50226, CVE-2024-52332, CVE-2024-56649, CVE-2024-56546, CVE-2024-53223, CVE-2024-50259, CVE-2024-50287, CVE-2024-56701, CVE-2024-56692, CVE-2024-50243, CVE-2024-53160, CVE-2024-56619, CVE-2024-50128, CVE-2024-53173, CVE-2024-53127, CVE-2024-56720, CVE-2024-56633, CVE-2024-48875, CVE-2024-56775, CVE-2024-50155, CVE-2024-56611, CVE-2024-56539, CVE-2024-50282, CVE-2024-56600, CVE-2024-53110, CVE-2024-50111, CVE-2024-56773, CVE-2024-53161, CVE-2024-56615, CVE-2024-56786, CVE-2024-56783, CVE-2024-56645, CVE-2024-50216, CVE-2024-56605, CVE-2024-56622, CVE-2024-56613, CVE-2024-50245, CVE-2024-50240, CVE-2024-53222, CVE-2024-53203, CVE-2024-53042, CVE-2024-56724, CVE-2024-57876, CVE-2024-49906, CVE-2024-56596, CVE-2024-50234, CVE-2024-41014, CVE-2024-53053, CVE-2024-48881, CVE-2024-56601, CVE-2024-56581, CVE-2024-56609, CVE-2024-56576, CVE-2024-53044, CVE-2024-53680, CVE-2024-50170, CVE-2024-50116, CVE-2024-56705, CVE-2024-53138, CVE-2024-53162, CVE-2024-50136, CVE-2024-53210, CVE-2024-50167, CVE-2024-50292, CVE-2024-53067, CVE-2024-53101, CVE-2024-56691, CVE-2024-53200, CVE-2024-50255, CVE-2024-53142, CVE-2025-21700, CVE-2024-50104, CVE-2024-56687, CVE-2024-50163, CVE-2024-56756, CVE-2024-50218, CVE-2024-56550, CVE-2024-53202, CVE-2024-50137, CVE-2024-50270, CVE-2024-56641, CVE-2024-53154, CVE-2024-53224, CVE-2024-53155, CVE-2024-50124, CVE-2024-41935, CVE-2024-50265, CVE-2024-53190, CVE-2024-50256, CVE-2024-53234, CVE-2024-56693, CVE-2024-50143, CVE-2024-53181, CVE-2024-50154, CVE-2024-53233, CVE-2024-56771, CVE-2024-53236, CVE-2024-53227, CVE-2024-56572, CVE-2024-53126, CVE-2024-56551, CVE-2024-50299, CVE-2024-53218, CVE-2024-50135, CVE-2024-53188, CVE-2024-56635, CVE-2024-53055, CVE-2024-56751, CVE-2024-56577, CVE-2024-50289, CVE-2024-56590, CVE-2024-56745, CVE-2024-53176, CVE-2024-56681, CVE-2024-50160, CVE-2024-56557, CVE-2024-53213, CVE-2024-50267, CVE-2024-50146, CVE-2024-56627, CVE-2024-50290, CVE-2024-56565, CVE-2024-56752, CVE-2024-56603, CVE-2024-50246, CVE-2024-56690, CVE-2024-50222, CVE-2024-53087, CVE-2024-53091, CVE-2024-50115, CVE-2024-53106, CVE-2024-50250, CVE-2024-50242, CVE-2024-50248, CVE-2024-53229, CVE-2024-56588, CVE-2024-56785, CVE-2024-53195, CVE-2025-21702, CVE-2024-53059, CVE-2024-50107, CVE-2024-50139, CVE-2024-50276, CVE-2024-56543, CVE-2024-53228, CVE-2024-50232, CVE-2024-53128, CVE-2024-56651, CVE-2024-53047, CVE-2024-56726, CVE-2024-50159, CVE-2024-50231, CVE-2024-56545, CVE-2024-56778, CVE-2024-56602, CVE-2024-50221, CVE-2024-56754, CVE-2024-56704, CVE-2024-56650, CVE-2024-57850, CVE-2024-50206, CVE-2024-56573, CVE-2024-56703, CVE-2024-53208, CVE-2024-53158, CVE-2024-50274, CVE-2024-56638, CVE-2024-50151, CVE-2024-53239, CVE-2024-56742, CVE-2024-50237, CVE-2024-53066, CVE-2024-56580, CVE-2024-56688, CVE-2024-53089, CVE-2024-56777, CVE-2024-50138, CVE-2024-53198, CVE-2024-56589, CVE-2024-56694, CVE-2024-50261, CVE-2024-53147, CVE-2024-50263, CVE-2024-56644, CVE-2024-56597, CVE-2024-53197, CVE-2024-50164, CVE-2024-53191, CVE-2024-56549, CVE-2024-50284, CVE-2024-57849, CVE-2024-56594, CVE-2024-56782, CVE-2024-50235, CVE-2024-49569, CVE-2024-53237, CVE-2024-56643, CVE-2024-53109, CVE-2024-53157, CVE-2024-56637, CVE-2024-56623, CVE-2024-56683, CVE-2024-50257, CVE-2024-56765, CVE-2024-53201, CVE-2024-53050, CVE-2024-53120, CVE-2024-53121, CVE-2024-50126, CVE-2024-56774, CVE-2024-53219, CVE-2024-56616, CVE-2024-50223, CVE-2024-41932, CVE-2024-50271, CVE-2024-56593, CVE-2024-50285, CVE-2024-53113, CVE-2025-21993, CVE-2024-56607, CVE-2024-50252, CVE-2024-56610, CVE-2024-53043, CVE-2024-50120, CVE-2024-44955, CVE-2024-50118, CVE-2024-53130, CVE-2024-56566, CVE-2024-53146, CVE-2024-56721, CVE-2024-53079, CVE-2024-56685, CVE-2024-50145, CVE-2024-56755, CVE-2024-50268, CVE-2024-53046, CVE-2024-50010, CVE-2024-56531, CVE-2024-53129, CVE-2024-47794, CVE-2024-53119, CVE-2024-50297, CVE-2024-56728, CVE-2025-21701, CVE-2024-53163, CVE-2024-56739, CVE-2024-56538, CVE-2024-50294, CVE-2024-53183, CVE-2024-53131, CVE-2024-56626, CVE-2024-50133, CVE-2024-53151, CVE-2024-56679, CVE-2024-50225, CVE-2024-50152, CVE-2024-53174, CVE-2024-56698, CVE-2024-53105, CVE-2024-53085, CVE-2024-53220, CVE-2024-53180, CVE-2024-53060, CVE-2024-53139, CVE-2024-56631, CVE-2024-53175, CVE-2024-57872, CVE-2024-56779, CVE-2024-50220, CVE-2024-50169, CVE-2024-56772, CVE-2024-53230, CVE-2024-53122, CVE-2024-50067, CVE-2024-56558, CVE-2024-45828, CVE-2024-57874, CVE-2024-50239, CVE-2024-53214, CVE-2024-56621, CVE-2024-50156, CVE-2024-56583, CVE-2024-56776, CVE-2024-50298, CVE-2024-56533, CVE-2024-56748, CVE-2024-53114, CVE-2024-53187, CVE-2024-50269, CVE-2024-50286, CVE-2024-56579, CVE-2024-56548, CVE-2024-50210, CVE-2024-50244, CVE-2024-50291, CVE-2024-56567, CVE-2024-56780, CVE-2024-53150, CVE-2024-56636, CVE-2024-56561, CVE-2024-53194, CVE-2024-53093, CVE-2024-53117, CVE-2024-53062, CVE-2024-53123, CVE-2024-50236, CVE-2024-56630, CVE-2024-56678, CVE-2024-48876, CVE-2024-50249, CVE-2024-53099, CVE-2024-53048, CVE-2024-50296, CVE-2024-50131, CVE-2024-50105, CVE-2024-50141, CVE-2024-56729, CVE-2024-53217, CVE-2024-50295, CVE-2024-50130, CVE-2024-56725, CVE-2024-42122, CVE-2024-56570, CVE-2024-53118, CVE-2024-50112, CVE-2024-50203, CVE-2024-53178, CVE-2024-53068, CVE-2024-50272, CVE-2024-53232, CVE-2024-53088, CVE-2024-56647, CVE-2024-53076, CVE-2024-53100, CVE-2024-53096, CVE-2024-56747, CVE-2024-53045, CVE-2024-53086, CVE-2024-50147, CVE-2024-53081, CVE-2024-50273, CVE-2024-50103, CVE-2024-53107, CVE-2024-53095, CVE-2024-47141, CVE-2024-56604, CVE-2024-50304, CVE-2024-53169, CVE-2024-50162, CVE-2024-53112) Update Instructions: Run `sudo pro fix USN-7449-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-ibm - 6.8.0-1024.24 linux-headers-6.8.0-1024-ibm - 6.8.0-1024.24 linux-headers-ibm - 6.8.0-1024.24 linux-headers-ibm-classic - 6.8.0-1024.24 linux-headers-ibm-lts-24.04 - 6.8.0-1024.24 linux-ibm - 6.8.0-1024.24 linux-ibm-classic - 6.8.0-1024.24 linux-ibm-headers-6.8.0-1024 - 6.8.0-1024.24 linux-ibm-lts-24.04 - 6.8.0-1024.24 linux-ibm-tools-6.8.0-1024 - 6.8.0-1024.24 linux-image-6.8.0-1024-ibm - 6.8.0-1024.24 linux-image-ibm - 6.8.0-1024.24 linux-image-ibm-classic - 6.8.0-1024.24 linux-image-ibm-lts-24.04 - 6.8.0-1024.24 linux-image-unsigned-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-extra-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-6.8.0-1024-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-ibm - 6.8.0-1024.24 linux-modules-iwlwifi-ibm-classic - 6.8.0-1024.24 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1024.24 linux-tools-6.8.0-1024-ibm - 6.8.0-1024.24 linux-tools-ibm - 6.8.0-1024.24 linux-tools-ibm-classic - 6.8.0-1024.24 linux-tools-ibm-lts-24.04 - 6.8.0-1024.24 No subscription required linux-buildinfo-6.8.0-1024-oracle - 6.8.0-1024.25 linux-buildinfo-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-headers-6.8.0-1024-oracle - 6.8.0-1024.25 linux-headers-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-headers-oracle - 6.8.0-1024.25 linux-headers-oracle-64k - 6.8.0-1024.25 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-headers-oracle-lts-24.04 - 6.8.0-1024.25 linux-image-6.8.0-1024-oracle - 6.8.0-1024.25 linux-image-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-image-oracle - 6.8.0-1024.25 linux-image-oracle-64k - 6.8.0-1024.25 linux-image-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-image-oracle-lts-24.04 - 6.8.0-1024.25 linux-image-unsigned-6.8.0-1024-oracle - 6.8.0-1024.25 linux-image-unsigned-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-modules-6.8.0-1024-oracle - 6.8.0-1024.25 linux-modules-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-modules-extra-6.8.0-1024-oracle - 6.8.0-1024.25 linux-modules-extra-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-oracle - 6.8.0-1024.25 linux-oracle-64k - 6.8.0-1024.25 linux-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-oracle-headers-6.8.0-1024 - 6.8.0-1024.25 linux-oracle-lts-24.04 - 6.8.0-1024.25 linux-oracle-tools-6.8.0-1024 - 6.8.0-1024.25 linux-tools-6.8.0-1024-oracle - 6.8.0-1024.25 linux-tools-6.8.0-1024-oracle-64k - 6.8.0-1024.25 linux-tools-oracle - 6.8.0-1024.25 linux-tools-oracle-64k - 6.8.0-1024.25 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1024.25 linux-tools-oracle-lts-24.04 - 6.8.0-1024.25 No subscription required linux-buildinfo-6.8.0-1026-oem - 6.8.0-1026.26 linux-headers-6.8.0-1026-oem - 6.8.0-1026.26 linux-headers-oem-24.04 - 6.8.0-1026.26 linux-headers-oem-24.04a - 6.8.0-1026.26 linux-image-6.8.0-1026-oem - 6.8.0-1026.26 linux-image-oem-24.04 - 6.8.0-1026.26 linux-image-oem-24.04a - 6.8.0-1026.26 linux-image-uc-6.8.0-1026-oem - 6.8.0-1026.26 linux-image-uc-oem-24.04 - 6.8.0-1026.26 linux-image-uc-oem-24.04a - 6.8.0-1026.26 linux-image-unsigned-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-ipu6-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-ipu6-oem-24.04 - 6.8.0-1026.26 linux-modules-ipu6-oem-24.04a - 6.8.0-1026.26 linux-modules-iwlwifi-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1026.26 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1026.26 linux-modules-usbio-6.8.0-1026-oem - 6.8.0-1026.26 linux-modules-usbio-oem-24.04 - 6.8.0-1026.26 linux-modules-usbio-oem-24.04a - 6.8.0-1026.26 linux-oem-24.04 - 6.8.0-1026.26 linux-oem-24.04a - 6.8.0-1026.26 linux-oem-6.8-headers-6.8.0-1026 - 6.8.0-1026.26 linux-oem-6.8-tools-6.8.0-1026 - 6.8.0-1026.26 linux-tools-6.8.0-1026-oem - 6.8.0-1026.26 linux-tools-oem-24.04 - 6.8.0-1026.26 linux-tools-oem-24.04a - 6.8.0-1026.26 No subscription required linux-buildinfo-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-buildinfo-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-cloud-tools-nvidia - 6.8.0-1026.29 linux-headers-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-headers-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-headers-nvidia - 6.8.0-1026.29 linux-headers-nvidia-64k - 6.8.0-1026.29 linux-image-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-image-nvidia - 6.8.0-1026.29 linux-image-nvidia-64k - 6.8.0-1026.29 linux-image-uc-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-uc-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-image-unsigned-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-image-unsigned-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-extra-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-modules-nvidia-fs-nvidia - 6.8.0-1026.29 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1026.29 linux-nvidia - 6.8.0-1026.29 linux-nvidia-64k - 6.8.0-1026.29 linux-nvidia-headers-6.8.0-1026 - 6.8.0-1026.29 linux-nvidia-tools-6.8.0-1026 - 6.8.0-1026.29 linux-tools-6.8.0-1026-nvidia - 6.8.0-1026.29 linux-tools-6.8.0-1026-nvidia-64k - 6.8.0-1026.29 linux-tools-nvidia - 6.8.0-1026.29 linux-tools-nvidia-64k - 6.8.0-1026.29 No subscription required linux-buildinfo-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-buildinfo-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-headers-nvidia-lowlatency - 6.8.0-1026.29.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-uc-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-uc-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-image-unsigned-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-image-unsigned-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-extra-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1026.29.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-nvidia-lowlatency - 6.8.0-1026.29.1 linux-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-nvidia-lowlatency-headers-6.8.0-1026 - 6.8.0-1026.29.1 linux-nvidia-lowlatency-tools-6.8.0-1026 - 6.8.0-1026.29.1 linux-tools-6.8.0-1026-nvidia-lowlatency - 6.8.0-1026.29.1 linux-tools-6.8.0-1026-nvidia-lowlatency-64k - 6.8.0-1026.29.1 linux-tools-nvidia-lowlatency - 6.8.0-1026.29.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1026.29.1 No subscription required linux-aws - 6.8.0-1027.29 linux-aws-cloud-tools-6.8.0-1027 - 6.8.0-1027.29 linux-aws-headers-6.8.0-1027 - 6.8.0-1027.29 linux-aws-lts-24.04 - 6.8.0-1027.29 linux-aws-tools-6.8.0-1027 - 6.8.0-1027.29 linux-buildinfo-6.8.0-1027-aws - 6.8.0-1027.29 linux-cloud-tools-6.8.0-1027-aws - 6.8.0-1027.29 linux-headers-6.8.0-1027-aws - 6.8.0-1027.29 linux-headers-aws - 6.8.0-1027.29 linux-headers-aws-lts-24.04 - 6.8.0-1027.29 linux-image-6.8.0-1027-aws - 6.8.0-1027.29 linux-image-aws - 6.8.0-1027.29 linux-image-aws-lts-24.04 - 6.8.0-1027.29 linux-image-unsigned-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-extra-6.8.0-1027-aws - 6.8.0-1027.29 linux-modules-extra-aws - 6.8.0-1027.29 linux-modules-extra-aws-lts-24.04 - 6.8.0-1027.29 linux-tools-6.8.0-1027-aws - 6.8.0-1027.29 linux-tools-aws - 6.8.0-1027.29 linux-tools-aws-lts-24.04 - 6.8.0-1027.29 No subscription required linux-azure-cloud-tools-6.8.0-1027 - 6.8.0-1027.32 linux-azure-fde-lts-24.04 - 6.8.0-1027.32 linux-azure-headers-6.8.0-1027 - 6.8.0-1027.32 linux-azure-lts-24.04 - 6.8.0-1027.32 linux-azure-tools-6.8.0-1027 - 6.8.0-1027.32 linux-buildinfo-6.8.0-1027-azure - 6.8.0-1027.32 linux-cloud-tools-6.8.0-1027-azure - 6.8.0-1027.32 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1027.32 linux-headers-6.8.0-1027-azure - 6.8.0-1027.32 linux-headers-azure-lts-24.04 - 6.8.0-1027.32 linux-image-6.8.0-1027-azure - 6.8.0-1027.32 linux-image-6.8.0-1027-azure-fde - 6.8.0-1027.32 linux-image-azure-fde-lts-24.04 - 6.8.0-1027.32 linux-image-azure-lts-24.04 - 6.8.0-1027.32 linux-image-unsigned-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-extra-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-extra-azure-lts-24.04 - 6.8.0-1027.32 linux-modules-involflt-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1027.32 linux-modules-iwlwifi-6.8.0-1027-azure - 6.8.0-1027.32 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1027.32 linux-tools-6.8.0-1027-azure - 6.8.0-1027.32 linux-tools-azure-lts-24.04 - 6.8.0-1027.32 No subscription required linux-bpf-dev - 6.8.0-58.60 linux-buildinfo-6.8.0-58-generic - 6.8.0-58.60 linux-buildinfo-6.8.0-58-generic-64k - 6.8.0-58.60 linux-cloud-tools-6.8.0-58 - 6.8.0-58.60 linux-cloud-tools-6.8.0-58-generic - 6.8.0-58.60 linux-cloud-tools-common - 6.8.0-58.60 linux-cloud-tools-generic - 6.8.0-58.60 linux-cloud-tools-virtual - 6.8.0-58.60 linux-crashdump - 6.8.0-58.60 linux-doc - 6.8.0-58.60 linux-generic - 6.8.0-58.60 linux-generic-64k - 6.8.0-58.60 linux-generic-lpae - 6.8.0-58.60 linux-headers-6.8.0-58 - 6.8.0-58.60 linux-headers-6.8.0-58-generic - 6.8.0-58.60 linux-headers-6.8.0-58-generic-64k - 6.8.0-58.60 linux-headers-generic - 6.8.0-58.60 linux-headers-generic-64k - 6.8.0-58.60 linux-headers-generic-lpae - 6.8.0-58.60 linux-headers-kvm - 6.8.0-58.60 linux-headers-laptop-23.10 - 6.8.0-58.60 linux-headers-oem-20.04 - 6.8.0-58.60 linux-headers-oem-20.04b - 6.8.0-58.60 linux-headers-oem-20.04c - 6.8.0-58.60 linux-headers-oem-20.04d - 6.8.0-58.60 linux-headers-oem-22.04 - 6.8.0-58.60 linux-headers-virtual - 6.8.0-58.60 linux-image-extra-virtual - 6.8.0-58.60 linux-image-generic - 6.8.0-58.60 linux-image-generic-64k - 6.8.0-58.60 linux-image-generic-lpae - 6.8.0-58.60 linux-image-kvm - 6.8.0-58.60 linux-image-laptop-23.10 - 6.8.0-58.60 linux-image-oem-20.04 - 6.8.0-58.60 linux-image-oem-20.04b - 6.8.0-58.60 linux-image-oem-20.04c - 6.8.0-58.60 linux-image-oem-20.04d - 6.8.0-58.60 linux-image-oem-22.04 - 6.8.0-58.60 linux-image-uc-generic - 6.8.0-58.60 linux-image-unsigned-6.8.0-58-generic - 6.8.0-58.60 linux-image-unsigned-6.8.0-58-generic-64k - 6.8.0-58.60 linux-image-virtual - 6.8.0-58.60 linux-kvm - 6.8.0-58.60 linux-laptop-23.10 - 6.8.0-58.60 linux-lib-rust-6.8.0-58-generic - 6.8.0-58.60 linux-libc-dev - 6.8.0-58.60 linux-modules-6.8.0-58-generic - 6.8.0-58.60 linux-modules-6.8.0-58-generic-64k - 6.8.0-58.60 linux-modules-extra-6.8.0-58-generic - 6.8.0-58.60 linux-modules-ipu6-6.8.0-58-generic - 6.8.0-58.60 linux-modules-ipu6-generic - 6.8.0-58.60 linux-modules-iwlwifi-6.8.0-58-generic - 6.8.0-58.60 linux-modules-iwlwifi-generic - 6.8.0-58.60 linux-modules-iwlwifi-oem-20.04 - 6.8.0-58.60 linux-modules-iwlwifi-oem-20.04d - 6.8.0-58.60 linux-modules-iwlwifi-oem-22.04 - 6.8.0-58.60 linux-modules-usbio-6.8.0-58-generic - 6.8.0-58.60 linux-modules-usbio-generic - 6.8.0-58.60 linux-oem-20.04 - 6.8.0-58.60 linux-oem-20.04b - 6.8.0-58.60 linux-oem-20.04c - 6.8.0-58.60 linux-oem-20.04d - 6.8.0-58.60 linux-oem-22.04 - 6.8.0-58.60 linux-source - 6.8.0-58.60 linux-source-6.8.0 - 6.8.0-58.60 linux-tools-6.8.0-58 - 6.8.0-58.60 linux-tools-6.8.0-58-generic - 6.8.0-58.60 linux-tools-6.8.0-58-generic-64k - 6.8.0-58.60 linux-tools-common - 6.8.0-58.60 linux-tools-generic - 6.8.0-58.60 linux-tools-generic-64k - 6.8.0-58.60 linux-tools-generic-lpae - 6.8.0-58.60 linux-tools-host - 6.8.0-58.60 linux-tools-kvm - 6.8.0-58.60 linux-tools-laptop-23.10 - 6.8.0-58.60 linux-tools-oem-20.04 - 6.8.0-58.60 linux-tools-oem-20.04b - 6.8.0-58.60 linux-tools-oem-20.04c - 6.8.0-58.60 linux-tools-oem-20.04d - 6.8.0-58.60 linux-tools-oem-22.04 - 6.8.0-58.60 linux-tools-virtual - 6.8.0-58.60 linux-virtual - 6.8.0-58.60 No subscription required linux-image-6.8.0-58-generic - 6.8.0-58.60+1 linux-image-6.8.0-58-generic-64k - 6.8.0-58.60+1 linux-image-uc-6.8.0-58-generic - 6.8.0-58.60+1 linux-image-uc-6.8.0-58-generic-64k - 6.8.0-58.60+1 No subscription required linux-buildinfo-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-buildinfo-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-cloud-tools-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-cloud-tools-lowlatency - 6.8.0-58.60.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-headers-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-headers-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-headers-lowlatency - 6.8.0-58.60.1 linux-headers-lowlatency-64k - 6.8.0-58.60.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-image-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-image-lowlatency - 6.8.0-58.60.1 linux-image-lowlatency-64k - 6.8.0-58.60.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-image-unsigned-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-image-unsigned-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-lowlatency - 6.8.0-58.60.1 linux-lowlatency-64k - 6.8.0-58.60.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-lowlatency-cloud-tools-6.8.0-58 - 6.8.0-58.60.1 linux-lowlatency-headers-6.8.0-58 - 6.8.0-58.60.1 linux-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 linux-lowlatency-lib-rust-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-lowlatency-tools-6.8.0-58 - 6.8.0-58.60.1 linux-modules-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-modules-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-modules-iwlwifi-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-modules-iwlwifi-lowlatency - 6.8.0-58.60.1 linux-tools-6.8.0-58-lowlatency - 6.8.0-58.60.1 linux-tools-6.8.0-58-lowlatency-64k - 6.8.0-58.60.1 linux-tools-lowlatency - 6.8.0-58.60.1 linux-tools-lowlatency-64k - 6.8.0-58.60.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-58.60.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-58.60.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-58.60.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-58.60.1 No subscription required High CVE-2022-49034 CVE-2024-41014 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49569 CVE-2024-49899 CVE-2024-49906 CVE-2024-50010 CVE-2024-50051 CVE-2024-50067 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50169 CVE-2024-50170 CVE-2024-50172 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50210 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061 CVE-2024-53062 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53185 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56561 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56596 CVE-2024-56597 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56765 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57838 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21993 USN-7450-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50051, CVE-2024-56546, CVE-2024-56551, CVE-2024-53236, CVE-2024-50244, CVE-2024-53043, CVE-2024-56694, CVE-2025-21700, CVE-2024-56700, CVE-2025-21993, CVE-2024-53224, CVE-2024-50105, CVE-2024-53100, CVE-2024-56690, CVE-2024-50150, CVE-2024-53223, CVE-2024-50285, CVE-2024-50269, CVE-2024-53089, CVE-2024-53044, CVE-2024-53175, CVE-2024-57849, CVE-2024-50296, CVE-2024-50120, CVE-2024-50147, CVE-2024-56540, CVE-2024-56602, CVE-2024-50289, CVE-2024-53127, CVE-2024-56786, CVE-2024-50108, CVE-2024-53045, CVE-2024-53067, CVE-2024-50138, CVE-2024-53173, CVE-2024-50143, CVE-2024-56678, CVE-2024-53130, CVE-2024-53157, CVE-2024-56723, CVE-2024-56623, CVE-2024-53234, CVE-2024-53088, CVE-2024-53068, CVE-2024-53195, CVE-2024-53188, CVE-2024-56613, CVE-2024-56561, CVE-2024-53218, CVE-2024-50215, CVE-2024-53227, CVE-2024-50139, CVE-2024-50170, CVE-2024-56640, CVE-2024-56720, CVE-2024-56780, CVE-2024-56705, CVE-2024-53131, CVE-2024-56597, CVE-2024-50224, CVE-2024-57843, CVE-2024-50251, CVE-2024-50243, CVE-2024-53200, CVE-2024-50280, CVE-2024-50303, CVE-2024-50107, CVE-2024-56606, CVE-2024-53237, CVE-2024-53161, CVE-2024-56685, CVE-2024-53185, CVE-2024-56785, CVE-2024-53150, CVE-2024-53166, CVE-2024-50141, CVE-2024-50158, CVE-2024-47143, CVE-2024-56773, CVE-2024-53090, CVE-2024-56778, CVE-2024-50142, CVE-2025-21701, CVE-2024-50301, CVE-2024-53050, CVE-2024-50211, CVE-2024-50246, CVE-2024-50252, CVE-2024-53122, CVE-2024-53085, CVE-2024-50104, CVE-2024-50288, CVE-2024-53151, CVE-2024-56728, CVE-2024-53086, CVE-2024-56568, CVE-2024-53133, CVE-2024-50290, CVE-2024-56774, CVE-2024-50278, CVE-2024-56565, CVE-2024-53147, CVE-2024-56775, CVE-2024-53239, CVE-2024-56533, CVE-2024-50225, CVE-2024-50124, CVE-2024-47794, CVE-2024-50163, CVE-2024-53680, CVE-2024-56574, CVE-2024-56605, CVE-2024-50112, CVE-2024-53221, CVE-2024-56751, CVE-2024-56538, CVE-2024-53123, CVE-2024-56688, CVE-2024-50239, CVE-2024-56742, CVE-2024-56752, CVE-2024-53059, CVE-2024-50282, CVE-2024-50238, CVE-2024-53108, CVE-2024-50152, CVE-2024-53214, CVE-2024-53226, CVE-2024-50292, CVE-2024-56580, CVE-2024-56621, CVE-2024-56593, CVE-2024-56689, CVE-2024-56649, CVE-2024-56650, CVE-2024-53203, CVE-2024-56626, CVE-2025-21831, CVE-2024-53053, CVE-2024-50257, CVE-2024-50203, CVE-2024-56643, CVE-2024-50231, CVE-2024-53066, CVE-2024-53105, CVE-2024-53233, CVE-2024-56703, CVE-2024-56725, CVE-2024-50172, CVE-2024-53160, CVE-2024-50131, CVE-2024-53196, CVE-2024-56645, CVE-2024-50304, CVE-2024-56746, CVE-2024-53232, CVE-2024-49906, CVE-2024-53129, CVE-2024-53135, CVE-2024-56545, CVE-2024-56600, CVE-2024-56642, CVE-2024-43098, CVE-2024-50291, CVE-2024-53219, CVE-2024-53197, CVE-2024-53084, CVE-2024-53155, CVE-2024-53094, CVE-2024-56581, CVE-2024-56531, CVE-2024-50300, CVE-2024-50232, CVE-2024-56590, CVE-2024-48881, CVE-2024-56708, CVE-2024-56632, CVE-2024-53051, CVE-2024-53177, CVE-2024-56698, CVE-2024-56707, CVE-2024-56693, CVE-2024-53213, CVE-2024-53121, CVE-2024-56681, CVE-2024-56607, CVE-2024-53120, CVE-2024-56615, CVE-2024-53109, CVE-2024-50209, CVE-2024-56592, CVE-2024-50103, CVE-2024-56722, CVE-2024-53046, CVE-2024-50155, CVE-2024-56765, CVE-2024-56572, CVE-2024-56611, CVE-2024-56679, CVE-2024-50259, CVE-2024-50111, CVE-2024-53217, CVE-2024-53113, CVE-2024-53101, CVE-2024-50208, CVE-2024-53115, CVE-2024-56691, CVE-2024-50137, CVE-2024-53194, CVE-2024-41935, CVE-2024-56584, CVE-2022-49034, CVE-2024-53072, CVE-2024-41932, CVE-2024-56729, CVE-2024-53095, CVE-2024-56755, CVE-2024-50268, CVE-2024-56631, CVE-2024-48875, CVE-2025-21756, CVE-2024-50127, CVE-2024-50136, CVE-2024-56562, CVE-2024-56683, CVE-2024-50250, CVE-2024-53184, CVE-2024-50205, CVE-2024-56543, CVE-2024-56787, CVE-2024-50116, CVE-2024-53096, CVE-2024-53169, CVE-2024-50154, CVE-2024-53230, CVE-2024-50247, CVE-2024-56570, CVE-2024-56583, CVE-2025-21702, CVE-2024-50126, CVE-2024-50151, CVE-2024-53208, CVE-2024-50153, CVE-2024-56619, CVE-2024-56532, CVE-2024-56776, CVE-2024-53093, CVE-2024-53139, CVE-2024-50263, CVE-2024-41014, CVE-2024-53126, CVE-2024-53052, CVE-2024-56636, CVE-2024-50299, CVE-2024-56601, CVE-2024-56569, CVE-2024-53168, CVE-2024-53112, CVE-2024-56576, CVE-2024-50230, CVE-2024-56630, CVE-2024-50010, CVE-2024-56599, CVE-2024-50156, CVE-2024-50286, CVE-2024-53174, CVE-2024-50216, CVE-2024-56744, CVE-2024-50265, CVE-2024-50255, CVE-2024-56567, CVE-2024-50118, CVE-2024-50276, CVE-2024-53099, CVE-2024-50234, CVE-2024-56745, CVE-2024-53114, CVE-2024-50273, CVE-2024-49899, CVE-2024-56608, CVE-2024-56625, CVE-2024-56577, CVE-2024-56596, CVE-2024-56634, CVE-2024-56777, CVE-2024-47141, CVE-2024-53180, CVE-2024-56701, CVE-2024-53158, CVE-2024-56566, CVE-2024-56616, CVE-2024-53117, CVE-2024-53181, CVE-2024-50115, CVE-2024-56772, CVE-2024-53163, CVE-2024-50140, CVE-2024-56633, CVE-2024-50262, CVE-2024-56677, CVE-2024-53201, CVE-2024-57850, CVE-2024-50271, CVE-2024-50279, CVE-2024-50226, CVE-2024-53191, CVE-2024-45828, CVE-2024-53106, CVE-2024-50275, CVE-2024-50245, CVE-2024-56783, CVE-2024-50261, CVE-2024-50283, CVE-2024-53062, CVE-2024-50240, CVE-2024-53183, CVE-2024-53222, CVE-2024-53119, CVE-2024-53138, CVE-2024-52332, CVE-2024-50167, CVE-2024-53042, CVE-2024-50169, CVE-2024-50162, CVE-2024-53087, CVE-2024-50298, CVE-2024-56610, CVE-2024-53060, CVE-2024-56578, CVE-2024-50272, CVE-2024-56604, CVE-2024-50287, CVE-2024-47809, CVE-2024-56603, CVE-2024-50237, CVE-2024-56647, CVE-2024-56747, CVE-2024-50221, CVE-2024-53215, CVE-2024-56550, CVE-2024-56748, CVE-2024-56557, CVE-2024-48873, CVE-2024-49569, CVE-2024-50206, CVE-2024-56781, CVE-2024-56638, CVE-2024-50218, CVE-2024-53055, CVE-2024-57838, CVE-2024-50267, CVE-2024-56575, CVE-2024-53202, CVE-2024-53154, CVE-2024-53176, CVE-2024-56779, CVE-2024-50210, CVE-2024-56589, CVE-2024-50130, CVE-2024-53190, CVE-2024-53082, CVE-2024-56549, CVE-2024-56594, CVE-2024-50294, CVE-2024-56754, CVE-2024-53142, CVE-2024-50295, CVE-2024-57872, CVE-2024-53081, CVE-2024-56629, CVE-2024-53209, CVE-2024-56558, CVE-2024-50164, CVE-2024-53162, CVE-2024-56539, CVE-2024-56721, CVE-2024-50121, CVE-2024-56651, CVE-2024-56609, CVE-2024-50207, CVE-2024-50220, CVE-2024-53228, CVE-2024-53171, CVE-2024-53110, CVE-2024-53146, CVE-2024-53148, CVE-2024-50284, CVE-2024-56739, CVE-2024-48876, CVE-2024-50222, CVE-2024-53079, CVE-2024-53048, CVE-2024-50135, CVE-2024-56726, CVE-2024-50110, CVE-2024-53145, CVE-2024-53198, CVE-2024-50249, CVE-2024-44955, CVE-2024-56573, CVE-2024-53047, CVE-2024-50133, CVE-2024-53091, CVE-2024-53134, CVE-2024-50128, CVE-2024-56648, CVE-2024-53111, CVE-2024-50258, CVE-2024-56587, CVE-2024-56644, CVE-2024-53229, CVE-2024-56727, CVE-2024-50159, CVE-2024-57874, CVE-2024-50166, CVE-2024-53210, CVE-2024-53172, CVE-2024-53107, CVE-2024-56620, CVE-2024-53076, CVE-2024-50236, CVE-2024-56627, CVE-2024-56771, CVE-2024-56724, CVE-2024-50235, CVE-2024-50270, CVE-2024-50160, CVE-2024-50067, CVE-2024-56641, CVE-2024-50297, CVE-2024-53178, CVE-2024-53231, CVE-2024-56692, CVE-2024-53128, CVE-2024-56635, CVE-2024-42122, CVE-2024-50223, CVE-2024-56586, CVE-2024-50242, CVE-2024-50256, CVE-2024-56756, CVE-2024-56782, CVE-2024-50145, CVE-2024-56704, CVE-2024-50146, CVE-2024-53058, CVE-2024-56588, CVE-2024-53187, CVE-2024-56548, CVE-2024-56579, CVE-2024-50248, CVE-2024-50125, CVE-2024-57876, CVE-2024-56687, CVE-2024-53061, CVE-2024-53118, CVE-2024-56622, CVE-2024-53083, CVE-2024-53220, CVE-2024-56637) Update Instructions: Run `sudo pro fix USN-7450-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-cloud-tools-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-cloud-tools-gkeop - 6.8.0-1010.12 linux-cloud-tools-gkeop-6.8 - 6.8.0-1010.12 linux-gkeop - 6.8.0-1010.12 linux-gkeop-6.8 - 6.8.0-1010.12 linux-gkeop-cloud-tools-6.8.0-1010 - 6.8.0-1010.12 linux-gkeop-headers-6.8.0-1010 - 6.8.0-1010.12 linux-gkeop-tools-6.8.0-1010 - 6.8.0-1010.12 linux-headers-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-headers-gkeop - 6.8.0-1010.12 linux-headers-gkeop-6.8 - 6.8.0-1010.12 linux-image-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-image-gkeop - 6.8.0-1010.12 linux-image-gkeop-6.8 - 6.8.0-1010.12 linux-image-unsigned-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-extra-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-modules-extra-gkeop - 6.8.0-1010.12 linux-modules-extra-gkeop-6.8 - 6.8.0-1010.12 linux-tools-6.8.0-1010-gkeop - 6.8.0-1010.12 linux-tools-gkeop - 6.8.0-1010.12 linux-tools-gkeop-6.8 - 6.8.0-1010.12 No subscription required linux-buildinfo-6.8.0-1023-gke - 6.8.0-1023.27 linux-gke - 6.8.0-1023.27 linux-gke-headers-6.8.0-1023 - 6.8.0-1023.27 linux-gke-tools-6.8.0-1023 - 6.8.0-1023.27 linux-headers-6.8.0-1023-gke - 6.8.0-1023.27 linux-headers-gke - 6.8.0-1023.27 linux-image-6.8.0-1023-gke - 6.8.0-1023.27 linux-image-gke - 6.8.0-1023.27 linux-image-unsigned-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-extra-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-iwlwifi-6.8.0-1023-gke - 6.8.0-1023.27 linux-modules-iwlwifi-gke - 6.8.0-1023.27 linux-tools-6.8.0-1023-gke - 6.8.0-1023.27 linux-tools-gke - 6.8.0-1023.27 No subscription required linux-buildinfo-6.8.0-1028-gcp - 6.8.0-1028.30 linux-buildinfo-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-gcp-headers-6.8.0-1028 - 6.8.0-1028.30 linux-gcp-lts-24.04 - 6.8.0-1028.30 linux-gcp-tools-6.8.0-1028 - 6.8.0-1028.30 linux-headers-6.8.0-1028-gcp - 6.8.0-1028.30 linux-headers-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-headers-gcp-lts-24.04 - 6.8.0-1028.30 linux-image-6.8.0-1028-gcp - 6.8.0-1028.30 linux-image-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-image-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-image-gcp-lts-24.04 - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-gcp - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-6.8.0-1028-gcp - 6.8.0-1028.30 linux-modules-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-gcp - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1028.30 linux-tools-6.8.0-1028-gcp - 6.8.0-1028.30 linux-tools-6.8.0-1028-gcp-64k - 6.8.0-1028.30 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1028.30 linux-tools-gcp-lts-24.04 - 6.8.0-1028.30 No subscription required High CVE-2022-49034 CVE-2024-41014 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49569 CVE-2024-49899 CVE-2024-49906 CVE-2024-50010 CVE-2024-50051 CVE-2024-50067 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50169 CVE-2024-50170 CVE-2024-50172 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50210 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061 CVE-2024-53062 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53185 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56561 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56596 CVE-2024-56597 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56765 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57838 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21993 USN-7453-1 -- Linux kernel (Real-time) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-53187, CVE-2024-50268, CVE-2024-53161, CVE-2024-56721, CVE-2024-53059, CVE-2024-53217, CVE-2022-49034, CVE-2024-53061, CVE-2024-50284, CVE-2024-50167, CVE-2024-53221, CVE-2024-56773, CVE-2024-53051, CVE-2024-50263, CVE-2024-56631, CVE-2024-53106, CVE-2024-50051, CVE-2024-50164, CVE-2024-56533, CVE-2024-53218, CVE-2024-56678, CVE-2024-56692, CVE-2024-50155, CVE-2025-21702, CVE-2024-53100, CVE-2024-50208, CVE-2024-56707, CVE-2024-56781, CVE-2024-48873, CVE-2024-50159, CVE-2024-50138, CVE-2024-50291, CVE-2024-53091, CVE-2024-56708, CVE-2024-50142, CVE-2024-50105, CVE-2024-50299, CVE-2024-50203, CVE-2024-53210, CVE-2024-56625, CVE-2024-53147, CVE-2024-50226, CVE-2024-50294, CVE-2024-50128, CVE-2024-53060, CVE-2024-56776, CVE-2024-56586, CVE-2024-56569, CVE-2024-53214, CVE-2024-53172, CVE-2024-48881, CVE-2024-53119, CVE-2024-50121, CVE-2024-53195, CVE-2024-56703, CVE-2024-56572, CVE-2024-50225, CVE-2024-50133, CVE-2024-50280, CVE-2024-53190, CVE-2024-56685, CVE-2024-53067, CVE-2024-56538, CVE-2024-53200, CVE-2024-56694, CVE-2024-53173, CVE-2024-53118, CVE-2024-53047, CVE-2024-50103, CVE-2024-56638, CVE-2024-50257, CVE-2024-53171, CVE-2024-57874, CVE-2024-56626, CVE-2024-56611, CVE-2024-56642, CVE-2024-56636, CVE-2025-21756, CVE-2024-53188, CVE-2024-56633, CVE-2024-53181, CVE-2024-50218, CVE-2024-56771, CVE-2024-56778, CVE-2024-56568, CVE-2024-56720, CVE-2024-50249, CVE-2024-53175, CVE-2024-53160, CVE-2024-53093, CVE-2024-56754, CVE-2024-53084, CVE-2024-53215, CVE-2024-47794, CVE-2024-50287, CVE-2024-49899, CVE-2024-56651, CVE-2024-53191, CVE-2024-56744, CVE-2024-50158, CVE-2024-56619, CVE-2024-53162, CVE-2024-53208, CVE-2024-56729, CVE-2024-56545, CVE-2024-56605, CVE-2024-48876, CVE-2024-50290, CVE-2024-53154, CVE-2024-56620, CVE-2025-21700, CVE-2024-53148, CVE-2024-50156, CVE-2024-53138, CVE-2024-50269, CVE-2024-50141, CVE-2024-56551, CVE-2024-50221, CVE-2024-50288, CVE-2024-56546, CVE-2024-50209, CVE-2024-53234, CVE-2024-50232, CVE-2024-53086, CVE-2024-53232, CVE-2024-50112, CVE-2024-57838, CVE-2024-53220, CVE-2024-53121, CVE-2024-53142, CVE-2024-56610, CVE-2024-57872, CVE-2024-50160, CVE-2024-50010, CVE-2024-56690, CVE-2024-53128, CVE-2024-56650, CVE-2024-53158, CVE-2024-57850, CVE-2024-53088, CVE-2024-56629, CVE-2024-50239, CVE-2024-50145, CVE-2024-56724, CVE-2024-56566, CVE-2024-50303, CVE-2024-53053, CVE-2024-56539, CVE-2024-50153, CVE-2024-50242, CVE-2024-53055, CVE-2024-53127, CVE-2024-56751, CVE-2024-56588, CVE-2024-56691, CVE-2024-53180, CVE-2024-53076, CVE-2024-53072, CVE-2024-53196, CVE-2024-56679, CVE-2024-53042, CVE-2024-56777, CVE-2024-42122, CVE-2024-50244, CVE-2024-50169, CVE-2024-50205, CVE-2024-53110, CVE-2024-53157, CVE-2024-50295, CVE-2024-53680, CVE-2024-56613, CVE-2024-53194, CVE-2024-56779, CVE-2024-56597, CVE-2024-50130, CVE-2024-53083, CVE-2024-50246, CVE-2024-53131, CVE-2024-53107, CVE-2024-56756, CVE-2024-56727, CVE-2024-50162, CVE-2024-50273, CVE-2024-56726, CVE-2024-50255, CVE-2024-53185, CVE-2024-50137, CVE-2024-41932, CVE-2024-56787, CVE-2024-56765, CVE-2024-56601, CVE-2024-56698, CVE-2024-56558, CVE-2024-57876, CVE-2024-56581, CVE-2024-53202, CVE-2024-50236, CVE-2024-56681, CVE-2024-50297, CVE-2024-53203, CVE-2024-53081, CVE-2024-53155, CVE-2024-50275, CVE-2024-56630, CVE-2024-50166, CVE-2024-57843, CVE-2024-56677, CVE-2024-53094, CVE-2024-53048, CVE-2024-50125, CVE-2024-50216, CVE-2024-56774, CVE-2024-44955, CVE-2024-56748, CVE-2024-50223, CVE-2024-53087, CVE-2024-56775, CVE-2024-50298, CVE-2024-56627, CVE-2024-50139, CVE-2024-53134, CVE-2024-53224, CVE-2024-53150, CVE-2024-56704, CVE-2024-53198, CVE-2024-53111, CVE-2024-50251, CVE-2024-53082, CVE-2024-56785, CVE-2024-56647, CVE-2024-50282, CVE-2024-53058, CVE-2024-56637, CVE-2024-50283, CVE-2024-50135, CVE-2024-56622, CVE-2024-50301, CVE-2024-50147, CVE-2024-50252, CVE-2024-56567, CVE-2024-50230, CVE-2024-53105, CVE-2024-56574, CVE-2024-56589, CVE-2024-56543, CVE-2024-50267, CVE-2024-53163, CVE-2024-53123, CVE-2024-50248, CVE-2024-53219, CVE-2024-50238, CVE-2024-50296, CVE-2024-56593, CVE-2024-56645, CVE-2024-50270, CVE-2024-56780, CVE-2024-56576, CVE-2024-53114, CVE-2024-53089, CVE-2024-56644, CVE-2024-56739, CVE-2024-53184, CVE-2024-56700, CVE-2024-56786, CVE-2024-43098, CVE-2024-50115, CVE-2024-53201, CVE-2024-50220, CVE-2024-53226, CVE-2024-53222, CVE-2024-53133, CVE-2024-50222, CVE-2024-56640, CVE-2024-50206, CVE-2024-53229, CVE-2024-41014, CVE-2024-50272, CVE-2024-56641, CVE-2024-53237, CVE-2024-50207, CVE-2024-53168, CVE-2024-56592, CVE-2024-53090, CVE-2024-56782, CVE-2024-53043, CVE-2024-50289, CVE-2024-56687, CVE-2024-56755, CVE-2024-50111, CVE-2024-57849, CVE-2024-53231, CVE-2024-56550, CVE-2024-50247, CVE-2024-53085, CVE-2024-56745, CVE-2024-56600, CVE-2024-56596, CVE-2024-50150, CVE-2024-56623, CVE-2024-53108, CVE-2024-56579, CVE-2024-50151, CVE-2024-56548, CVE-2024-56565, CVE-2024-50110, CVE-2024-47141, CVE-2024-41935, CVE-2024-50274, CVE-2024-56603, CVE-2024-53197, CVE-2024-56688, CVE-2024-56577, CVE-2024-53174, CVE-2024-56723, CVE-2024-56616, CVE-2024-56573, CVE-2024-53044, CVE-2024-53109, CVE-2024-52332, CVE-2024-53079, CVE-2024-50131, CVE-2024-53068, CVE-2024-50163, CVE-2024-56772, CVE-2024-56634, CVE-2024-53095, CVE-2024-50215, CVE-2024-50243, CVE-2024-50265, CVE-2024-56540, CVE-2024-53045, CVE-2024-56562, CVE-2024-53135, CVE-2024-56689, CVE-2024-56570, CVE-2024-53066, CVE-2024-53145, CVE-2024-56580, CVE-2024-53101, CVE-2024-53177, CVE-2024-53183, CVE-2024-53115, CVE-2024-56722, CVE-2025-21993, CVE-2024-49569, CVE-2025-21831, CVE-2024-50279, CVE-2024-53052, CVE-2024-53113, CVE-2024-50292, CVE-2024-50224, CVE-2024-50259, CVE-2024-56615, CVE-2024-56649, CVE-2024-53169, CVE-2024-56635, CVE-2024-50261, CVE-2024-50172, CVE-2024-53228, CVE-2024-53166, CVE-2024-50140, CVE-2024-50170, CVE-2024-56587, CVE-2024-56607, CVE-2024-56575, CVE-2024-53099, CVE-2024-49906, CVE-2024-50234, CVE-2024-56531, CVE-2024-50127, CVE-2024-56608, CVE-2024-56583, CVE-2024-56648, CVE-2024-48875, CVE-2024-50152, CVE-2024-53062, CVE-2024-53176, CVE-2024-50250, CVE-2024-53233, CVE-2024-56578, CVE-2024-53112, CVE-2024-53146, CVE-2024-56590, CVE-2024-56584, CVE-2024-50211, CVE-2024-50116, CVE-2024-50124, CVE-2024-50067, CVE-2024-53050, CVE-2024-45828, CVE-2024-47809, CVE-2024-50276, CVE-2024-56557, CVE-2024-50304, CVE-2024-56742, CVE-2024-50108, CVE-2024-53122, CVE-2024-56602, CVE-2024-50235, CVE-2024-50278, CVE-2024-56561, CVE-2024-56632, CVE-2025-21701, CVE-2024-56752, CVE-2024-50262, CVE-2024-56621, CVE-2024-53129, CVE-2024-50285, CVE-2024-56643, CVE-2024-53227, CVE-2024-50258, CVE-2024-53139, CVE-2024-53209, CVE-2024-56701, CVE-2024-56594, CVE-2024-53223, CVE-2024-50136, CVE-2024-50256, CVE-2024-53178, CVE-2024-53236, CVE-2024-56549, CVE-2024-56683, CVE-2024-53126, CVE-2024-53120, CVE-2024-53117, CVE-2024-50104, CVE-2024-50146, CVE-2024-53239, CVE-2024-56599, CVE-2024-50210, CVE-2024-56609, CVE-2024-50245, CVE-2024-56705, CVE-2024-56604, CVE-2024-50118, CVE-2024-56783, CVE-2024-50271, CVE-2024-53151, CVE-2024-56728, CVE-2024-56746, CVE-2024-53213, CVE-2024-50231, CVE-2024-56532, CVE-2024-53130, CVE-2024-50143, CVE-2024-50286, CVE-2024-53230, CVE-2024-53096, CVE-2024-50154, CVE-2024-50237, CVE-2024-50240, CVE-2024-56725, CVE-2024-56693, CVE-2024-56606, CVE-2024-50126, CVE-2024-56747, CVE-2024-50107, CVE-2024-50300, CVE-2024-47143, CVE-2024-53046, CVE-2024-50120) Update Instructions: Run `sudo pro fix USN-7453-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1020-realtime - 6.8.1-1020.21 linux-cloud-tools-6.8.1-1020-realtime - 6.8.1-1020.21 linux-headers-6.8.1-1020-realtime - 6.8.1-1020.21 linux-headers-realtime - 6.8.1-1020.21 linux-headers-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-6.8.1-1020-realtime - 6.8.1-1020.21 linux-image-realtime - 6.8.1-1020.21 linux-image-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-uc-6.8.1-1020-realtime - 6.8.1-1020.21 linux-image-uc-realtime - 6.8.1-1020.21 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1020.21 linux-image-unsigned-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-extra-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-6.8.1-1020-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-realtime - 6.8.1-1020.21 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1020.21 linux-realtime - 6.8.1-1020.21 linux-realtime-cloud-tools-6.8.1-1020 - 6.8.1-1020.21 linux-realtime-headers-6.8.1-1020 - 6.8.1-1020.21 linux-realtime-hwe-24.04 - 6.8.1-1020.21 linux-realtime-tools-6.8.1-1020 - 6.8.1-1020.21 linux-tools-6.8.1-1020-realtime - 6.8.1-1020.21 linux-tools-realtime - 6.8.1-1020.21 linux-tools-realtime-hwe-24.04 - 6.8.1-1020.21 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2022-49034 CVE-2024-41014 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49569 CVE-2024-49899 CVE-2024-49906 CVE-2024-50010 CVE-2024-50051 CVE-2024-50067 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50169 CVE-2024-50170 CVE-2024-50172 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50210 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061 CVE-2024-53062 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53185 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53201 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56561 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56596 CVE-2024-56597 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56765 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57838 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21993 USN-7454-1 -- libarchive vulnerabilities Ubuntu 24.04 LTS It was discovered that the libarchive bsdunzip utility incorrectly handled certain ZIP archive files. If a user or automated system were tricked into processing a specially crafted ZIP archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-1632) It was discovered that libarchive incorrectly handled certain TAR archive files. If a user or automated system were tricked into processing a specially crafted TAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-25724) Update Instructions: Run `sudo pro fix USN-7454-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.4 libarchive-tools - 3.7.2-2ubuntu0.4 libarchive13t64 - 3.7.2-2ubuntu0.4 No subscription required Medium CVE-2025-1632 CVE-2025-25724 USN-7456-1 -- Twig vulnerabilities Ubuntu 24.04 LTS Fabien Potencier discovered that Twig did not run sandbox security checks in some circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-45411) Jamie Schouten discovered that Twig could bypass the security policy for an object call. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-51754) Update Instructions: Run `sudo pro fix USN-7456-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-twig - 3.8.0-2ubuntu0.1~esm1 php-twig-cache-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-cssinliner-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-doc - 3.8.0-2ubuntu0.1~esm1 php-twig-extra-bundle - 3.8.0-2ubuntu0.1~esm1 php-twig-html-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-inky-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-intl-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-markdown-extra - 3.8.0-2ubuntu0.1~esm1 php-twig-string-extra - 3.8.0-2ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-45411 CVE-2024-51754 USN-7457-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS It was discovered that OpenSSH incorrectly handled the DisableForwarding directive. The directive would fail to disable X11 and agent forwarding, contrary to documentation and expectations. Update Instructions: Run `sudo pro fix USN-7457-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.11 openssh-server - 1:9.6p1-3ubuntu13.11 openssh-sftp-server - 1:9.6p1-3ubuntu13.11 openssh-tests - 1:9.6p1-3ubuntu13.11 ssh - 1:9.6p1-3ubuntu13.11 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.11 No subscription required Medium CVE-2025-32728 USN-7464-1 -- Jupyter Notebook vulnerability Ubuntu 24.04 LTS It was discovered that Jupyter Notebook did not properly parse HTML comments under certain circumstances. An attacker could possibly use this issue to cause a regular expression denial of service (ReDoS). Update Instructions: Run `sudo pro fix USN-7464-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: jupyter-notebook - 6.4.12-2.2ubuntu1+esm1 python-notebook-doc - 6.4.12-2.2ubuntu1+esm1 python3-notebook - 6.4.12-2.2ubuntu1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-25887 USN-7467-1 -- libxml2 vulnerabilities Ubuntu 24.04 LTS It was discovered that the libxml2 Python bindings incorrectly handled certain return values. An attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32414) It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32415) Update Instructions: Run `sudo pro fix USN-7467-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.3 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.3 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.3 No subscription required Medium CVE-2025-32414 CVE-2025-32415 USN-7468-1 -- Linux kernel (Azure, N-Series) vulnerabilities Ubuntu 24.04 LTS Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - Kernel Samepage Merging mechanism; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Perf events; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Timer subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netlink; - Packet sockets; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-49996, CVE-2024-56693, CVE-2024-49928, CVE-2024-47728, CVE-2024-50218, CVE-2024-50197, CVE-2024-50084, CVE-2024-56698, CVE-2024-56623, CVE-2024-50203, CVE-2024-56786, CVE-2024-53198, CVE-2024-49939, CVE-2024-49852, CVE-2024-49920, CVE-2024-53117, CVE-2024-50023, CVE-2024-56581, CVE-2024-49954, CVE-2024-56658, CVE-2024-56688, CVE-2024-56574, CVE-2024-56690, CVE-2024-53158, CVE-2024-56777, CVE-2024-56582, CVE-2024-56629, CVE-2024-49997, CVE-2024-50041, CVE-2024-53052, CVE-2024-50126, CVE-2024-56726, CVE-2024-50007, CVE-2024-47712, CVE-2024-50225, CVE-2024-50269, CVE-2024-50200, CVE-2024-53099, CVE-2024-50083, CVE-2024-53162, CVE-2024-57876, CVE-2024-50180, CVE-2024-56678, CVE-2024-50179, CVE-2024-56776, CVE-2024-53151, CVE-2024-56631, CVE-2024-50160, CVE-2024-50302, CVE-2024-53126, CVE-2024-50151, CVE-2024-49917, CVE-2024-49899, CVE-2024-49927, CVE-2024-48875, CVE-2024-50298, CVE-2024-53148, CVE-2024-53160, CVE-2024-50187, CVE-2024-50072, CVE-2024-56756, CVE-2024-56625, CVE-2024-44955, CVE-2024-47671, CVE-2024-47141, CVE-2024-50047, CVE-2024-50048, CVE-2024-50245, CVE-2024-50096, CVE-2024-56602, CVE-2024-53232, CVE-2024-50284, CVE-2024-53129, CVE-2024-56724, CVE-2024-56632, CVE-2024-49924, CVE-2024-47756, CVE-2024-53226, CVE-2024-50189, CVE-2024-56573, CVE-2024-50257, CVE-2024-50300, CVE-2024-47673, CVE-2024-50152, CVE-2024-53215, CVE-2024-50295, CVE-2024-50111, CVE-2024-49865, CVE-2024-47691, CVE-2024-56649, CVE-2024-56567, CVE-2024-53061, CVE-2024-50153, CVE-2024-53091, CVE-2024-56692, CVE-2024-41932, CVE-2024-56650, CVE-2024-56645, CVE-2024-47670, CVE-2024-53130, CVE-2024-50066, CVE-2024-50020, CVE-2024-50154, CVE-2024-49998, CVE-2024-50290, CVE-2024-56594, CVE-2024-56627, CVE-2024-49882, CVE-2024-50220, CVE-2024-49914, CVE-2024-50019, CVE-2024-53213, CVE-2024-50015, CVE-2024-53172, CVE-2024-50198, CVE-2024-53051, CVE-2024-50280, CVE-2024-53187, CVE-2024-50136, CVE-2024-47672, CVE-2024-56606, CVE-2024-47699, CVE-2024-56780, CVE-2024-56672, CVE-2024-56637, CVE-2024-49946, CVE-2024-56752, CVE-2024-50199, CVE-2024-53119, CVE-2024-53084, CVE-2024-50076, CVE-2024-49938, CVE-2024-50237, CVE-2024-56779, CVE-2024-50108, CVE-2024-50162, CVE-2024-49936, CVE-2024-41935, CVE-2024-53046, CVE-2024-56572, CVE-2024-53107, CVE-2024-53150, CVE-2024-56539, CVE-2024-49949, CVE-2024-41014, CVE-2024-53217, CVE-2024-49977, CVE-2025-21702, CVE-2024-50267, CVE-2024-50138, CVE-2024-50229, CVE-2024-56586, CVE-2024-50057, CVE-2024-50070, CVE-2024-49898, CVE-2024-50085, CVE-2024-56746, CVE-2024-53106, CVE-2024-47695, CVE-2024-50009, CVE-2024-50103, CVE-2024-47693, CVE-2024-53135, CVE-2024-53127, CVE-2024-50067, CVE-2024-57850, CVE-2024-56615, CVE-2024-50167, CVE-2024-50042, CVE-2024-56546, CVE-2024-47749, CVE-2024-47705, CVE-2024-47747, CVE-2024-56570, CVE-2024-56604, CVE-2024-53112, CVE-2024-49988, CVE-2024-56597, CVE-2024-50268, CVE-2024-53121, CVE-2024-56635, CVE-2024-50002, CVE-2024-50127, CVE-2024-56603, CVE-2024-56531, CVE-2024-49890, CVE-2024-53157, CVE-2024-50246, CVE-2024-56562, CVE-2024-56722, CVE-2024-49912, CVE-2024-56774, CVE-2024-49893, CVE-2024-56593, CVE-2024-53131, CVE-2024-57798, CVE-2024-50275, CVE-2024-50075, CVE-2024-53174, CVE-2024-53087, CVE-2024-50155, CVE-2024-47696, CVE-2024-53155, CVE-2024-50201, CVE-2024-53134, CVE-2024-49922, CVE-2024-53138, CVE-2024-47711, CVE-2024-47742, CVE-2024-53043, CVE-2024-48881, CVE-2024-53203, CVE-2024-53053, CVE-2024-56589, CVE-2024-56679, CVE-2024-49892, CVE-2024-56677, CVE-2024-53144, CVE-2024-50107, CVE-2024-56583, CVE-2025-21701, CVE-2024-49911, CVE-2024-50244, CVE-2024-49969, CVE-2024-50098, CVE-2024-50166, CVE-2024-47809, CVE-2024-56781, CVE-2024-49894, CVE-2025-21700, CVE-2024-49930, CVE-2024-56548, CVE-2024-50134, CVE-2024-53194, CVE-2024-50285, CVE-2024-42122, CVE-2024-53171, CVE-2024-53120, CVE-2024-50279, CVE-2024-57838, CVE-2024-50082, CVE-2024-50168, CVE-2024-53175, CVE-2024-47710, CVE-2024-49972, CVE-2024-56727, CVE-2024-49919, CVE-2024-53066, CVE-2024-56708, CVE-2024-53142, CVE-2024-49896, CVE-2024-49950, CVE-2024-53114, CVE-2024-47737, CVE-2024-56721, CVE-2024-50030, CVE-2024-50063, CVE-2024-56704, CVE-2024-56694, CVE-2024-49937, CVE-2024-56596, CVE-2024-49855, CVE-2024-53231, CVE-2024-50259, CVE-2024-50163, CVE-2024-50263, CVE-2024-56579, CVE-2024-50148, CVE-2024-50252, CVE-2024-56775, CVE-2024-53195, CVE-2024-56771, CVE-2024-56765, CVE-2024-50192, CVE-2024-56705, CVE-2024-56566, CVE-2024-49851, CVE-2024-56575, CVE-2024-53222, CVE-2024-50014, CVE-2024-49891, CVE-2024-53128, CVE-2024-49921, CVE-2024-50024, CVE-2024-56703, CVE-2024-56787, CVE-2024-56723, CVE-2024-56687, CVE-2024-47718, CVE-2024-49902, CVE-2024-49963, CVE-2024-56691, CVE-2024-53173, CVE-2024-56599, CVE-2024-50080, CVE-2024-47704, CVE-2024-49934, CVE-2024-56707, CVE-2024-49958, CVE-2024-49888, CVE-2024-53095, CVE-2024-53089, CVE-2024-49935, CVE-2024-50022, CVE-2024-47748, CVE-2024-56634, CVE-2024-53090, CVE-2024-50242, CVE-2024-53085, CVE-2024-50073, CVE-2024-50068, CVE-2024-49877, CVE-2024-56642, CVE-2024-53067, CVE-2024-50118, CVE-2024-50061, CVE-2024-49948, CVE-2024-53100, CVE-2024-50194, CVE-2024-50116, CVE-2024-48873, CVE-2024-53180, CVE-2024-56663, CVE-2024-50303, CVE-2024-50250, CVE-2024-50045, CVE-2024-50296, CVE-2024-49961, CVE-2024-56549, CVE-2024-50027, CVE-2024-53227, CVE-2024-50292, CVE-2024-49900, CVE-2024-50074, CVE-2024-53115, CVE-2024-56747, CVE-2024-50078, CVE-2024-56772, CVE-2024-53141, CVE-2024-50301, CVE-2024-53079, CVE-2024-50255, CVE-2024-56565, CVE-2024-53165, CVE-2024-52332, CVE-2024-53140, CVE-2024-50286, CVE-2024-53088, CVE-2024-53139, CVE-2024-49881, CVE-2024-49859, CVE-2024-50247, CVE-2024-50278, CVE-2024-50124, CVE-2024-47709, CVE-2024-50128, CVE-2024-49962, CVE-2024-50258, CVE-2024-56532, CVE-2024-47684, CVE-2024-56633, CVE-2024-53210, CVE-2024-49867, CVE-2024-50056, CVE-2024-50137, CVE-2024-47730, CVE-2024-49960, CVE-2024-50060, CVE-2024-49925, CVE-2024-50195, CVE-2024-50031, CVE-2024-50099, CVE-2024-49863, CVE-2024-49992, CVE-2024-53083, CVE-2024-56751, CVE-2024-50141, CVE-2024-47701, CVE-2024-53122, CVE-2024-56576, CVE-2024-47689, CVE-2024-50121, CVE-2024-50147, CVE-2024-50226, CVE-2024-50239, CVE-2024-56578, CVE-2024-50062, CVE-2024-50033, CVE-2024-49982, CVE-2024-56545, CVE-2024-53118, CVE-2024-50231, CVE-2024-50125, CVE-2024-50191, CVE-2024-49875, CVE-2024-47794, CVE-2024-49983, CVE-2024-56595, CVE-2024-50224, CVE-2024-47690, CVE-2024-50272, CVE-2024-49901, CVE-2024-56538, CVE-2024-50010, CVE-2024-49959, CVE-2024-53154, CVE-2024-53221, CVE-2024-49886, CVE-2024-50145, CVE-2024-49884, CVE-2024-50028, CVE-2024-50232, CVE-2024-53208, CVE-2024-50000, CVE-2024-56728, CVE-2024-50304, CVE-2024-49989, CVE-2024-47739, CVE-2024-56550, CVE-2024-50055, CVE-2024-56590, CVE-2024-53055, CVE-2024-50270, CVE-2024-53164, CVE-2024-49856, CVE-2024-57849, CVE-2024-47697, CVE-2024-43098, CVE-2024-50170, CVE-2024-53196, CVE-2024-50251, CVE-2024-56533, CVE-2024-41016, CVE-2024-53105, CVE-2024-53230, CVE-2024-50164, CVE-2024-50101, CVE-2024-56607, CVE-2024-50186, CVE-2024-50105, CVE-2024-47679, CVE-2024-48876, CVE-2024-50243, CVE-2024-47720, CVE-2024-53239, CVE-2024-53062, CVE-2024-50021, CVE-2024-56614, CVE-2024-53224, CVE-2024-56619, CVE-2024-53072, CVE-2024-53223, CVE-2024-50039, CVE-2024-49981, CVE-2024-50230, CVE-2024-47143, CVE-2024-53082, CVE-2024-50216, CVE-2024-47713, CVE-2024-56720, CVE-2024-56543, CVE-2024-53094, CVE-2024-53111, CVE-2024-50036, CVE-2024-50065, CVE-2024-57874, CVE-2024-56689, CVE-2024-53183, CVE-2024-53108, CVE-2024-56643, CVE-2024-49868, CVE-2024-56611, CVE-2024-50185, CVE-2024-50223, CVE-2024-50193, CVE-2024-56616, CVE-2024-50265, CVE-2024-56701, CVE-2024-50112, CVE-2024-50297, CVE-2024-50207, CVE-2024-56558, CVE-2024-56782, CVE-2024-53081, CVE-2024-50044, CVE-2024-50040, CVE-2024-49991, CVE-2024-50013, CVE-2024-53170, CVE-2024-56540, CVE-2024-47723, CVE-2024-49913, CVE-2024-53169, CVE-2024-49974, CVE-2024-50256, CVE-2024-49858, CVE-2024-56609, CVE-2024-50282, CVE-2024-53168, CVE-2024-50182, CVE-2024-49973, CVE-2024-56638, CVE-2024-56683, CVE-2024-50059, CVE-2024-56648, CVE-2024-45828, CVE-2024-56610, CVE-2024-47740, CVE-2024-47692, CVE-2024-50026, CVE-2024-50117, CVE-2024-50221, CVE-2024-49931, CVE-2024-49994, CVE-2024-50184, CVE-2024-50171, CVE-2024-50261, CVE-2024-50283, CVE-2024-50233, CVE-2024-53184, CVE-2024-53220, CVE-2024-53191, CVE-2024-53190, CVE-2024-56592, CVE-2024-47703, CVE-2024-53048, CVE-2024-49955, CVE-2024-50150, CVE-2024-50208, CVE-2024-56577, CVE-2024-50159, CVE-2024-50131, CVE-2024-56755, CVE-2024-50172, CVE-2024-53146, CVE-2024-53161, CVE-2024-50222, CVE-2024-49879, CVE-2024-50146, CVE-2024-53063, CVE-2024-49889, CVE-2024-50287, CVE-2024-56647, CVE-2024-56613, CVE-2024-50017, CVE-2024-56551, CVE-2024-53145, CVE-2024-53166, CVE-2024-56622, CVE-2025-21993, CVE-2024-50133, CVE-2024-53234, CVE-2024-53133, CVE-2024-47735, CVE-2024-49861, CVE-2024-50143, CVE-2024-50169, CVE-2024-50046, CVE-2024-50069, CVE-2024-56742, CVE-2024-50104, CVE-2024-56636, CVE-2024-56745, CVE-2024-56630, CVE-2024-50276, CVE-2024-53228, CVE-2024-49945, CVE-2025-21756, CVE-2024-50142, CVE-2024-56729, CVE-2024-49569, CVE-2024-49952, CVE-2024-50006, CVE-2024-50273, CVE-2024-49906, CVE-2024-53058, CVE-2024-49895, CVE-2024-50240, CVE-2024-49987, CVE-2024-53233, CVE-2024-53086, CVE-2024-50110, CVE-2024-50064, CVE-2024-49878, CVE-2024-56644, CVE-2024-56605, CVE-2024-47698, CVE-2024-53147, CVE-2024-47745, CVE-2024-56685, CVE-2024-50016, CVE-2024-49871, CVE-2024-47757, CVE-2024-53103, CVE-2024-56580, CVE-2024-49883, CVE-2024-53163, CVE-2024-53110, CVE-2024-50058, CVE-2024-56640, CVE-2024-53101, CVE-2024-53156, CVE-2022-49034, CVE-2024-53109, CVE-2024-49978, CVE-2024-50235, CVE-2024-53680, CVE-2024-50299, CVE-2024-53177, CVE-2024-50008, CVE-2024-56744, CVE-2025-21831, CVE-2024-50038, CVE-2024-50271, CVE-2024-53178, CVE-2024-50012, CVE-2024-53188, CVE-2024-49860, CVE-2024-53237, CVE-2024-50188, CVE-2024-49880, CVE-2024-50077, CVE-2024-49968, CVE-2024-50236, CVE-2024-50206, CVE-2024-53197, CVE-2024-56587, CVE-2024-53236, CVE-2024-50139, CVE-2024-50120, CVE-2024-56681, CVE-2024-53059, CVE-2024-53113, CVE-2024-50209, CVE-2024-49957, CVE-2024-49944, CVE-2024-50087, CVE-2024-56754, CVE-2024-49903, CVE-2024-56600, CVE-2024-47706, CVE-2024-49907, CVE-2024-53202, CVE-2024-50215, CVE-2024-47734, CVE-2024-56785, CVE-2024-53229, CVE-2024-53050, CVE-2024-50051, CVE-2024-53209, CVE-2024-56739, CVE-2024-50262, CVE-2024-50088, CVE-2024-56621, CVE-2024-49929, CVE-2024-57843, CVE-2024-56569, CVE-2024-50140, CVE-2024-50135, CVE-2024-57872, CVE-2024-49866, CVE-2024-53214, CVE-2024-50090, CVE-2024-49985, CVE-2024-56608, CVE-2024-56598, CVE-2024-49915, CVE-2024-53104, CVE-2024-50035, CVE-2024-53047, CVE-2024-53176, CVE-2024-56700, CVE-2024-49975, CVE-2024-53200, CVE-2024-50274, CVE-2024-56748, CVE-2024-56601, CVE-2024-50289, CVE-2024-50086, CVE-2024-53044, CVE-2024-50029, CVE-2024-49909, CVE-2024-47738, CVE-2024-47726, CVE-2024-56568, CVE-2024-53181, CVE-2024-53218, CVE-2024-56725, CVE-2024-56778, CVE-2024-50115, CVE-2024-50288, CVE-2024-50291, CVE-2024-50049, CVE-2024-56773, CVE-2024-50001, CVE-2024-49933, CVE-2024-50211, CVE-2024-50095, CVE-2024-56651, CVE-2024-50238, CVE-2024-47707, CVE-2024-50205, CVE-2024-50093, CVE-2024-50183, CVE-2024-56588, CVE-2024-49965, CVE-2024-56584, CVE-2024-53096, CVE-2024-50248, CVE-2024-50234, CVE-2024-49926, CVE-2024-49923, CVE-2024-49918, CVE-2024-50130, CVE-2024-53093, CVE-2024-56626, CVE-2024-50156, CVE-2024-56557, CVE-2024-50196, CVE-2024-56620, CVE-2024-49870, CVE-2024-50294, CVE-2024-53042, CVE-2024-53076, CVE-2024-49905, CVE-2024-53045, CVE-2024-50202, CVE-2024-56641, CVE-2024-53219, CVE-2024-50158, CVE-2024-50025, CVE-2024-47685, CVE-2024-49966, CVE-2024-53123, CVE-2024-53068, CVE-2024-47678) Update Instructions: Run `sudo pro fix USN-7468-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-nvidia - 6.8.0-1014.15 linux-azure-nvidia-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-azure-nvidia-cloud-tools-common - 6.8.0-1014.15 linux-azure-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-azure-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-cloud-tools-azure-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-headers-azure-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-image-azure-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-modules-extra-azure-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-azure-nvidia - 6.8.0-1014.15 linux-tools-azure-nvidia - 6.8.0-1014.15 No subscription required High CVE-2022-49034 CVE-2024-41014 CVE-2024-41016 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47670 CVE-2024-47671 CVE-2024-47672 CVE-2024-47673 CVE-2024-47678 CVE-2024-47679 CVE-2024-47684 CVE-2024-47685 CVE-2024-47689 CVE-2024-47690 CVE-2024-47691 CVE-2024-47692 CVE-2024-47693 CVE-2024-47695 CVE-2024-47696 CVE-2024-47697 CVE-2024-47698 CVE-2024-47699 CVE-2024-47701 CVE-2024-47703 CVE-2024-47704 CVE-2024-47705 CVE-2024-47706 CVE-2024-47707 CVE-2024-47709 CVE-2024-47710 CVE-2024-47711 CVE-2024-47712 CVE-2024-47713 CVE-2024-47718 CVE-2024-47720 CVE-2024-47723 CVE-2024-47726 CVE-2024-47728 CVE-2024-47730 CVE-2024-47734 CVE-2024-47735 CVE-2024-47737 CVE-2024-47738 CVE-2024-47739 CVE-2024-47740 CVE-2024-47742 CVE-2024-47745 CVE-2024-47747 CVE-2024-47748 CVE-2024-47749 CVE-2024-47756 CVE-2024-47757 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49569 CVE-2024-49851 CVE-2024-49852 CVE-2024-49855 CVE-2024-49856 CVE-2024-49858 CVE-2024-49859 CVE-2024-49860 CVE-2024-49861 CVE-2024-49863 CVE-2024-49865 CVE-2024-49866 CVE-2024-49867 CVE-2024-49868 CVE-2024-49870 CVE-2024-49871 CVE-2024-49875 CVE-2024-49877 CVE-2024-49878 CVE-2024-49879 CVE-2024-49880 CVE-2024-49881 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49886 CVE-2024-49888 CVE-2024-49889 CVE-2024-49890 CVE-2024-49891 CVE-2024-49892 CVE-2024-49893 CVE-2024-49894 CVE-2024-49895 CVE-2024-49896 CVE-2024-49898 CVE-2024-49899 CVE-2024-49900 CVE-2024-49901 CVE-2024-49902 CVE-2024-49903 CVE-2024-49905 CVE-2024-49906 CVE-2024-49907 CVE-2024-49909 CVE-2024-49911 CVE-2024-49912 CVE-2024-49913 CVE-2024-49914 CVE-2024-49915 CVE-2024-49917 CVE-2024-49918 CVE-2024-49919 CVE-2024-49920 CVE-2024-49921 CVE-2024-49922 CVE-2024-49923 CVE-2024-49924 CVE-2024-49925 CVE-2024-49926 CVE-2024-49927 CVE-2024-49928 CVE-2024-49929 CVE-2024-49930 CVE-2024-49931 CVE-2024-49933 CVE-2024-49934 CVE-2024-49935 CVE-2024-49936 CVE-2024-49937 CVE-2024-49938 CVE-2024-49939 CVE-2024-49944 CVE-2024-49945 CVE-2024-49946 CVE-2024-49948 CVE-2024-49949 CVE-2024-49950 CVE-2024-49952 CVE-2024-49954 CVE-2024-49955 CVE-2024-49957 CVE-2024-49958 CVE-2024-49959 CVE-2024-49960 CVE-2024-49961 CVE-2024-49962 CVE-2024-49963 CVE-2024-49965 CVE-2024-49966 CVE-2024-49968 CVE-2024-49969 CVE-2024-49972 CVE-2024-49973 CVE-2024-49974 CVE-2024-49975 CVE-2024-49977 CVE-2024-49978 CVE-2024-49981 CVE-2024-49982 CVE-2024-49983 CVE-2024-49985 CVE-2024-49987 CVE-2024-49988 CVE-2024-49989 CVE-2024-49991 CVE-2024-49992 CVE-2024-49994 CVE-2024-49996 CVE-2024-49997 CVE-2024-49998 CVE-2024-50000 CVE-2024-50001 CVE-2024-50002 CVE-2024-50006 CVE-2024-50007 CVE-2024-50008 CVE-2024-50009 CVE-2024-50010 CVE-2024-50012 CVE-2024-50013 CVE-2024-50014 CVE-2024-50015 CVE-2024-50017 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50051 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50067 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50117 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50134 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50148 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50168 CVE-2024-50169 CVE-2024-50170 CVE-2024-50171 CVE-2024-50172 CVE-2024-50179 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50229 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50302 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53061 CVE-2024-53062 CVE-2024-53063 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53103 CVE-2024-53104 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53140 CVE-2024-53141 CVE-2024-53142 CVE-2024-53144 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53164 CVE-2024-53165 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56658 CVE-2024-56663 CVE-2024-56672 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56765 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57798 CVE-2024-57838 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2024-8805 CVE-2025-0927 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21993 CVE-2025-2312 USN-7471-1 -- poppler vulnerabilities Ubuntu 24.04 LTS It was discovered that poppler did not properly verify adbe.pkcs7.sha1 signatures in PDF documents. An attacker could possibly use this issue to create documents with forged signatures that are treated as legitimately signed. Update Instructions: Run `sudo pro fix USN-7471-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.4 libpoppler-cpp-dev - 24.02.0-1ubuntu9.4 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.4 libpoppler-dev - 24.02.0-1ubuntu9.4 libpoppler-glib-dev - 24.02.0-1ubuntu9.4 libpoppler-glib-doc - 24.02.0-1ubuntu9.4 libpoppler-glib8t64 - 24.02.0-1ubuntu9.4 libpoppler-private-dev - 24.02.0-1ubuntu9.4 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.4 libpoppler-qt5-dev - 24.02.0-1ubuntu9.4 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.4 libpoppler-qt6-dev - 24.02.0-1ubuntu9.4 libpoppler134 - 24.02.0-1ubuntu9.4 poppler-utils - 24.02.0-1ubuntu9.4 No subscription required Medium CVE-2025-43903 USN-7472-1 -- Micropython vulnerabilities Ubuntu 24.04 LTS Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled the length of a buffer in mp_vfs_umount, leading to a heap-based buffer overflow vulnerability. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-8946) Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled memory, leading to a use-after-free vulnerability under certain circumstances. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-8947) It was discovered that Middleware USB Host MCU Component incorrectly handled memory, leading to a buffer overflow vulnerability, If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2021-42553) Update Instructions: Run `sudo pro fix USN-7472-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: micropython - 1.22.1+ds-1ubuntu0.24.04.1~esm1 micropython-doc - 1.22.1+ds-1ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-42553 CVE-2024-8946 CVE-2024-8947 USN-7473-1 -- Ghostscript vulnerability Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly handled parsing certain PS files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly bypass file path validation. Update Instructions: Run `sudo pro fix USN-7473-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.6 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.6 libgs-common - 10.02.1~dfsg1-0ubuntu7.6 libgs-dev - 10.02.1~dfsg1-0ubuntu7.6 libgs10 - 10.02.1~dfsg1-0ubuntu7.6 libgs10-common - 10.02.1~dfsg1-0ubuntu7.6 No subscription required Medium CVE-2025-46646 USN-7474-1 -- Docker vulnerabilities Ubuntu 24.04 LTS Cory Snider discovered that Docker incorrectly handled networking packet encapsulation. An attacker could use this issue to inject internet packets in established connection, possibly causing a denial of service or bypassing firewall protections. This issue only affected Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. (CVE-2023-28840, CVE-2023-28841, CVE-2023-28842) Rory McNamara discovered that Docker incorrectly handled cache in the BuildKit toolkit. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-23651) It was discovered that Docker incorrectly handled parallel operations in some circumstances, which could possibly lead to undefined behavior. (CVE-2024-36621, CVE-2024-36623) Rory McNamara discovered that Docker incorrectly verified file paths during a certain command in the BuildKit toolkit. An attacker could possibly use this issue to delete arbitrary files from the system. (CVE-2024-23652) Update Instructions: Run `sudo pro fix USN-7474-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-docker-docker-dev - 20.10.25+dfsg1-2ubuntu1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-28840 CVE-2023-28841 CVE-2023-28842 CVE-2024-23651 CVE-2024-23652 CVE-2024-36621 CVE-2024-36623 USN-7476-1 -- Scrapy vulnerabilities Ubuntu 24.04 LTS It was discovered that Scrapy improperly exposed HTTP authentication credentials to request targets, including during redirects. An attacker could use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-41125) It was discovered that Scrapy did not remove the cookie header during cross-domain redirects. An attacker could possibly use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-0577) It was discovered that Scrapy inefficiently parsed XML content. An attacker could use this issue to cause a denial of service by sending a crafted XML response. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-1892) It was discovered that Scrapy did not properly check response size during decompression. An attacker could send a crafted response that would exhaust memory and cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-3572) It was discovered that Scrapy did not remove the authorization header during cross-domain redirects. An attacker could possibly use this issue to gain unauthorized access to user accounts. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2024-3574) It was discovered that Scrapy did not remove the authorization header during redirects that change scheme but remain in the same domain. This issue could possibly be used by an attacker to expose sensitive information or to gain unauthorized access to user accounts. (CVE-2024-1968) Update Instructions: Run `sudo pro fix USN-7476-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-scrapy-doc - 2.11.1-1ubuntu0.1~esm2 python3-scrapy - 2.11.1-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-41125 CVE-2022-0577 CVE-2024-1892 CVE-2024-1968 CVE-2024-3572 CVE-2024-3574 USN-7478-1 -- Corosync vulnerability Ubuntu 24.04 LTS It was discovered that Corosync incorrectly handled certain large UDP packets. If encryption is disabled, or an attacker knows the encryption key, this issue could be used to cause Corosync to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7478-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: corosync - 3.1.7-1ubuntu3.1 corosync-doc - 3.1.7-1ubuntu3.1 corosync-notifyd - 3.1.7-1ubuntu3.1 corosync-vqsim - 3.1.7-1ubuntu3.1 libcfg-dev - 3.1.7-1ubuntu3.1 libcfg7 - 3.1.7-1ubuntu3.1 libcmap-dev - 3.1.7-1ubuntu3.1 libcmap4 - 3.1.7-1ubuntu3.1 libcorosync-common-dev - 3.1.7-1ubuntu3.1 libcorosync-common4 - 3.1.7-1ubuntu3.1 libcpg-dev - 3.1.7-1ubuntu3.1 libcpg4 - 3.1.7-1ubuntu3.1 libquorum-dev - 3.1.7-1ubuntu3.1 libquorum5 - 3.1.7-1ubuntu3.1 libsam-dev - 3.1.7-1ubuntu3.1 libsam4 - 3.1.7-1ubuntu3.1 libvotequorum-dev - 3.1.7-1ubuntu3.1 libvotequorum8 - 3.1.7-1ubuntu3.1 No subscription required Medium CVE-2025-30472 USN-7479-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.42 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. Ubuntu 25.04 has been updated to MySQL 8.4.5. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-42.html https://dev.mysql.com/doc/relnotes/mysql/8.4/en/news-8-4-5.html https://www.oracle.com/security-alerts/cpuapr2025.html Update Instructions: Run `sudo pro fix USN-7479-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.42-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.42-0ubuntu0.24.04.1 mysql-client - 8.0.42-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-router - 8.0.42-0ubuntu0.24.04.1 mysql-server - 8.0.42-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.42-0ubuntu0.24.04.1 mysql-testsuite - 8.0.42-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.42-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-21574 CVE-2025-21575 CVE-2025-21577 CVE-2025-21579 CVE-2025-21580 CVE-2025-21581 CVE-2025-21584 CVE-2025-21585 CVE-2025-21588 CVE-2025-30681 CVE-2025-30682 CVE-2025-30683 CVE-2025-30684 CVE-2025-30685 CVE-2025-30687 CVE-2025-30688 CVE-2025-30689 CVE-2025-30693 CVE-2025-30695 CVE-2025-30696 CVE-2025-30699 CVE-2025-30703 CVE-2025-30704 CVE-2025-30705 CVE-2025-30715 CVE-2025-30721 CVE-2025-30722 USN-7480-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS Alicja Kario discovered that the JSSE component of OpenJDK 8 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 8 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 8 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7480-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-doc - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jdk - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jdk-headless - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre-headless - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-jre-zero - 8u452-ga~us1-0ubuntu1~24.04 openjdk-8-source - 8u452-ga~us1-0ubuntu1~24.04 No subscription required Medium CVE-2025-21587 CVE-2025-30691 CVE-2025-30698 USN-7481-1 -- OpenJDK 11 vulnerabilities Ubuntu 24.04 LTS Alicja Kario discovered that the JSSE component of OpenJDK 11 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 11 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 11 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7481-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-doc - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jdk - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jdk-headless - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre-headless - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-jre-zero - 11.0.27+6~us1-0ubuntu1~24.04 openjdk-11-source - 11.0.27+6~us1-0ubuntu1~24.04 No subscription required Medium CVE-2025-21587 CVE-2025-30691 CVE-2025-30698 USN-7482-1 -- OpenJDK 17 vulnerabilities Ubuntu 24.04 LTS Alicja Kario discovered that the JSSE component of OpenJDK 17 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 17 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 17 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7482-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-doc - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jdk - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jdk-headless - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre-headless - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-jre-zero - 17.0.15+6~us1-0ubuntu1~24.04 openjdk-17-source - 17.0.15+6~us1-0ubuntu1~24.04 No subscription required Medium CVE-2025-21587 CVE-2025-30691 CVE-2025-30698 USN-7483-1 -- OpenJDK 21 vulnerabilities Ubuntu 24.04 LTS Alicja Kario discovered that the JSSE component of OpenJDK 21 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 21 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 21 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15 Update Instructions: Run `sudo pro fix USN-7483-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-doc - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jdk - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jdk-headless - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-headless - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-zero - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-source - 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-testsupport - 21.0.7+6~us1-0ubuntu1~24.04 No subscription required Medium CVE-2025-21587 CVE-2025-30691 CVE-2025-30698 USN-7485-1 -- LibRaw vulnerabilities Ubuntu 24.04 LTS It was discovered that LibRaw could be made to read out of bounds. An attacker could possibly use this issue to cause applications using LibRaw to crash, resulting in a denial of service. (CVE-2025-43961, CVE-2025-43962, CVE-2025-43963, CVE-2025-43964) Update Instructions: Run `sudo pro fix USN-7485-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libraw-bin - 0.21.2-2.1ubuntu0.24.04.1 libraw-dev - 0.21.2-2.1ubuntu0.24.04.1 libraw-doc - 0.21.2-2.1ubuntu0.24.04.1 libraw23t64 - 0.21.2-2.1ubuntu0.24.04.1 No subscription required Medium CVE-2025-43961 CVE-2025-43962 CVE-2025-43963 CVE-2025-43964 USN-7486-1 -- FastCGI vulnerability Ubuntu 24.04 LTS It was discovered that FastCGI incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7486-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libfcgi-bin - 2.4.2-2.1ubuntu0.24.04.1 libfcgi-dev - 2.4.2-2.1ubuntu0.24.04.1 libfcgi0t64 - 2.4.2-2.1ubuntu0.24.04.1 No subscription required Medium CVE-2025-23016 USN-7489-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS One security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Timer subsystem; (CVE-2025-21813) Update Instructions: Run `sudo pro fix USN-7489-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-buildinfo-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-cloud-tools-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-headers-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-headers-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-image-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-image-unsigned-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-image-unsigned-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1013 - 6.11.0-1013.14~24.04.1 linux-modules-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-modules-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-tools-6.11.0-1013-lowlatency - 6.11.0-1013.14~24.04.1 linux-tools-6.11.0-1013-lowlatency-64k - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1013.14~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1013.14~24.04.1 No subscription required linux-buildinfo-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-buildinfo-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-gcp - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-headers-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-lib-rust-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-gcp-6.11-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-gcp-64k - 6.11.0-1014.14~24.04.1 linux-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-gcp-edge - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-headers-gcp - 6.11.0-1014.14~24.04.1 linux-headers-gcp-64k - 6.11.0-1014.14~24.04.1 linux-headers-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-headers-gcp-edge - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-image-gcp - 6.11.0-1014.14~24.04.1 linux-image-gcp-64k - 6.11.0-1014.14~24.04.1 linux-image-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-image-gcp-edge - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-64k - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-modules-extra-gcp-edge - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-gcp - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-gcp-64k - 6.11.0-1014.14~24.04.1 linux-tools-gcp - 6.11.0-1014.14~24.04.1 linux-tools-gcp-64k - 6.11.0-1014.14~24.04.1 linux-tools-gcp-64k-edge - 6.11.0-1014.14~24.04.1 linux-tools-gcp-edge - 6.11.0-1014.14~24.04.1 No subscription required linux-buildinfo-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-buildinfo-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-cloud-tools-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-headers-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-hwe-6.11-headers-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-hwe-6.11-tools-6.11.0-25 - 6.11.0-25.25~24.04.1 linux-image-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-uc-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-uc-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-image-unsigned-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-image-unsigned-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-modules-extra-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu6-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-ipu7-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-usbio-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-modules-vision-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-6.11.0-25-generic - 6.11.0-25.25~24.04.1 linux-tools-6.11.0-25-generic-64k - 6.11.0-25.25~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-25.25~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-25.25~24.04.1 No subscription required Medium CVE-2025-21813 USN-7490-1 -- libsoup vulnerabilities Ubuntu 24.04 LTS Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.3 libsoup-2.4-1 - 2.74.3-6ubuntu1.3 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.3 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.3 libsoup2.4-common - 2.74.3-6ubuntu1.3 libsoup2.4-dev - 2.74.3-6ubuntu1.3 libsoup2.4-doc - 2.74.3-6ubuntu1.3 libsoup2.4-tests - 2.74.3-6ubuntu1.3 No subscription required Medium CVE-2025-32906 CVE-2025-32909 CVE-2025-32910 CVE-2025-32911 CVE-2025-32912 CVE-2025-32913 CVE-2025-32914 CVE-2025-46420 CVE-2025-46421 USN-7490-2 -- libsoup regression Ubuntu 24.04 LTS USN-7490-1 fixed vulnerabilities in libsoup. It was discovered that the fix for CVE-2025-32912 was incomplete. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.4 libsoup-2.4-1 - 2.74.3-6ubuntu1.4 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.4 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.4 libsoup2.4-common - 2.74.3-6ubuntu1.4 libsoup2.4-dev - 2.74.3-6ubuntu1.4 libsoup2.4-doc - 2.74.3-6ubuntu1.4 libsoup2.4-tests - 2.74.3-6ubuntu1.4 No subscription required Medium CVE-2025-32912 https://launchpad.net/bugs/2110056 USN-7490-3 -- libsoup vulnerabilities Ubuntu 24.04 LTS USN-7490-1 fixed vulnerabilities in libsoup2.4. This update provides the corresponding updates for libsoup3. Original advisory details: Tan Wei Chong discovered that libsoup incorrectly handled memory when parsing HTTP request headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-32906) Alon Zahavi discovered that libsoup incorrectly parsed video files. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service, or leading to undefined behavior. (CVE-2025-32909) Jan Różański discovered that libsoup incorrectly handled memory when parsing authentication headers. An attacker could possibly use this issue to send a maliciously crafted HTTP response back to the client, causing a denial of service. (CVE-2025-32910, CVE-2025-32912) It was discovered that libsoup incorrectly handled data in the hash table data type. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or remote code execution. (CVE-2025-32911) Jan Różański discovered that libsoup incorrectly handled memory when parsing the content disposition HTTP header. An attacker could possibly use this issue to send maliciously crafted data to a client or server, causing a denial of service. (CVE-2025-32913) Alon Zahavi discovered that libsoup incorrectly handled memory when parsing HTTP requests. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service or obtaining sensitive information. (CVE-2025-32914) It was discovered that libsoup incorrectly handled memory when parsing quality-list headers. An attacker could possibly use this issue to send a maliciously crafted HTTP request to the server, causing a denial of service. (CVE-2025-46420) Jan Różański discovered that libsoup did not strip authorization information upon redirects. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-46421) Update Instructions: Run `sudo pro fix USN-7490-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-3.0 - 3.4.4-5ubuntu0.3 libsoup-3.0-0 - 3.4.4-5ubuntu0.3 libsoup-3.0-common - 3.4.4-5ubuntu0.3 libsoup-3.0-dev - 3.4.4-5ubuntu0.3 libsoup-3.0-doc - 3.4.4-5ubuntu0.3 libsoup-3.0-tests - 3.4.4-5ubuntu0.3 No subscription required Medium CVE-2025-32906 CVE-2025-32909 CVE-2025-32910 CVE-2025-32911 CVE-2025-32912 CVE-2025-32913 CVE-2025-32914 CVE-2025-46420 CVE-2025-46421 USN-7491-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - USB Type-C Connector System Software Interface driver; - Timer subsystem; (CVE-2025-21902, CVE-2025-21813) Update Instructions: Run `sudo pro fix USN-7491-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1021-oem - 6.11.0-1021.21 linux-headers-6.11.0-1021-oem - 6.11.0-1021.21 linux-headers-oem-24.04b - 6.11.0-1021.21 linux-image-6.11.0-1021-oem - 6.11.0-1021.21 linux-image-oem-24.04b - 6.11.0-1021.21 linux-image-uc-6.11.0-1021-oem - 6.11.0-1021.21 linux-image-uc-oem-24.04b - 6.11.0-1021.21 linux-image-unsigned-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu6-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu6-oem-24.04b - 6.11.0-1021.21 linux-modules-ipu7-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-ipu7-oem-24.04b - 6.11.0-1021.21 linux-modules-iwlwifi-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1021.21 linux-modules-usbio-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-usbio-oem-24.04b - 6.11.0-1021.21 linux-modules-vision-6.11.0-1021-oem - 6.11.0-1021.21 linux-modules-vision-oem-24.04b - 6.11.0-1021.21 linux-oem-24.04b - 6.11.0-1021.21 linux-oem-6.11-headers-6.11.0-1021 - 6.11.0-1021.21 linux-oem-6.11-tools-6.11.0-1021 - 6.11.0-1021.21 linux-tools-6.11.0-1021-oem - 6.11.0-1021.21 linux-tools-oem-24.04b - 6.11.0-1021.21 No subscription required Medium CVE-2025-21813 CVE-2025-21902 USN-7492-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issues was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; (CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7492-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-cloud-tools-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-cloud-tools-gkeop - 6.8.0-1011.13 linux-cloud-tools-gkeop-6.8 - 6.8.0-1011.13 linux-gkeop - 6.8.0-1011.13 linux-gkeop-6.8 - 6.8.0-1011.13 linux-gkeop-cloud-tools-6.8.0-1011 - 6.8.0-1011.13 linux-gkeop-headers-6.8.0-1011 - 6.8.0-1011.13 linux-gkeop-tools-6.8.0-1011 - 6.8.0-1011.13 linux-headers-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-headers-gkeop - 6.8.0-1011.13 linux-headers-gkeop-6.8 - 6.8.0-1011.13 linux-image-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-image-gkeop - 6.8.0-1011.13 linux-image-gkeop-6.8 - 6.8.0-1011.13 linux-image-unsigned-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-extra-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-modules-extra-gkeop - 6.8.0-1011.13 linux-modules-extra-gkeop-6.8 - 6.8.0-1011.13 linux-tools-6.8.0-1011-gkeop - 6.8.0-1011.13 linux-tools-gkeop - 6.8.0-1011.13 linux-tools-gkeop-6.8 - 6.8.0-1011.13 No subscription required linux-buildinfo-6.8.0-1024-gke - 6.8.0-1024.28 linux-gke - 6.8.0-1024.28 linux-gke-headers-6.8.0-1024 - 6.8.0-1024.28 linux-gke-tools-6.8.0-1024 - 6.8.0-1024.28 linux-headers-6.8.0-1024-gke - 6.8.0-1024.28 linux-headers-gke - 6.8.0-1024.28 linux-image-6.8.0-1024-gke - 6.8.0-1024.28 linux-image-gke - 6.8.0-1024.28 linux-image-unsigned-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-extra-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-iwlwifi-6.8.0-1024-gke - 6.8.0-1024.28 linux-modules-iwlwifi-gke - 6.8.0-1024.28 linux-tools-6.8.0-1024-gke - 6.8.0-1024.28 linux-tools-gke - 6.8.0-1024.28 No subscription required linux-buildinfo-6.8.0-1025-ibm - 6.8.0-1025.25 linux-headers-6.8.0-1025-ibm - 6.8.0-1025.25 linux-headers-ibm - 6.8.0-1025.25 linux-headers-ibm-classic - 6.8.0-1025.25 linux-headers-ibm-lts-24.04 - 6.8.0-1025.25 linux-ibm - 6.8.0-1025.25 linux-ibm-classic - 6.8.0-1025.25 linux-ibm-headers-6.8.0-1025 - 6.8.0-1025.25 linux-ibm-lts-24.04 - 6.8.0-1025.25 linux-ibm-tools-6.8.0-1025 - 6.8.0-1025.25 linux-image-6.8.0-1025-ibm - 6.8.0-1025.25 linux-image-ibm - 6.8.0-1025.25 linux-image-ibm-classic - 6.8.0-1025.25 linux-image-ibm-lts-24.04 - 6.8.0-1025.25 linux-image-unsigned-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-extra-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-6.8.0-1025-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-ibm - 6.8.0-1025.25 linux-modules-iwlwifi-ibm-classic - 6.8.0-1025.25 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1025.25 linux-tools-6.8.0-1025-ibm - 6.8.0-1025.25 linux-tools-ibm - 6.8.0-1025.25 linux-tools-ibm-classic - 6.8.0-1025.25 linux-tools-ibm-lts-24.04 - 6.8.0-1025.25 No subscription required linux-buildinfo-6.8.0-1025-oracle - 6.8.0-1025.26 linux-buildinfo-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-headers-6.8.0-1025-oracle - 6.8.0-1025.26 linux-headers-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-headers-oracle - 6.8.0-1025.26 linux-headers-oracle-64k - 6.8.0-1025.26 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-headers-oracle-lts-24.04 - 6.8.0-1025.26 linux-image-6.8.0-1025-oracle - 6.8.0-1025.26 linux-image-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-image-oracle - 6.8.0-1025.26 linux-image-oracle-64k - 6.8.0-1025.26 linux-image-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-image-oracle-lts-24.04 - 6.8.0-1025.26 linux-image-unsigned-6.8.0-1025-oracle - 6.8.0-1025.26 linux-image-unsigned-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-modules-6.8.0-1025-oracle - 6.8.0-1025.26 linux-modules-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-modules-extra-6.8.0-1025-oracle - 6.8.0-1025.26 linux-modules-extra-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-oracle - 6.8.0-1025.26 linux-oracle-64k - 6.8.0-1025.26 linux-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-oracle-headers-6.8.0-1025 - 6.8.0-1025.26 linux-oracle-lts-24.04 - 6.8.0-1025.26 linux-oracle-tools-6.8.0-1025 - 6.8.0-1025.26 linux-tools-6.8.0-1025-oracle - 6.8.0-1025.26 linux-tools-6.8.0-1025-oracle-64k - 6.8.0-1025.26 linux-tools-oracle - 6.8.0-1025.26 linux-tools-oracle-64k - 6.8.0-1025.26 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1025.26 linux-tools-oracle-lts-24.04 - 6.8.0-1025.26 No subscription required linux-buildinfo-6.8.0-1027-oem - 6.8.0-1027.27 linux-headers-6.8.0-1027-oem - 6.8.0-1027.27 linux-headers-oem-24.04 - 6.8.0-1027.27 linux-headers-oem-24.04a - 6.8.0-1027.27 linux-image-6.8.0-1027-oem - 6.8.0-1027.27 linux-image-oem-24.04 - 6.8.0-1027.27 linux-image-oem-24.04a - 6.8.0-1027.27 linux-image-uc-6.8.0-1027-oem - 6.8.0-1027.27 linux-image-uc-oem-24.04 - 6.8.0-1027.27 linux-image-uc-oem-24.04a - 6.8.0-1027.27 linux-image-unsigned-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-ipu6-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-ipu6-oem-24.04 - 6.8.0-1027.27 linux-modules-ipu6-oem-24.04a - 6.8.0-1027.27 linux-modules-iwlwifi-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1027.27 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1027.27 linux-modules-usbio-6.8.0-1027-oem - 6.8.0-1027.27 linux-modules-usbio-oem-24.04 - 6.8.0-1027.27 linux-modules-usbio-oem-24.04a - 6.8.0-1027.27 linux-oem-24.04 - 6.8.0-1027.27 linux-oem-24.04a - 6.8.0-1027.27 linux-oem-6.8-headers-6.8.0-1027 - 6.8.0-1027.27 linux-oem-6.8-tools-6.8.0-1027 - 6.8.0-1027.27 linux-tools-6.8.0-1027-oem - 6.8.0-1027.27 linux-tools-oem-24.04 - 6.8.0-1027.27 linux-tools-oem-24.04a - 6.8.0-1027.27 No subscription required linux-buildinfo-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-buildinfo-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-cloud-tools-nvidia - 6.8.0-1027.30 linux-headers-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-headers-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-headers-nvidia - 6.8.0-1027.30 linux-headers-nvidia-64k - 6.8.0-1027.30 linux-image-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-image-nvidia - 6.8.0-1027.30 linux-image-nvidia-64k - 6.8.0-1027.30 linux-image-uc-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-uc-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-image-unsigned-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-image-unsigned-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-extra-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-modules-nvidia-fs-nvidia - 6.8.0-1027.30 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1027.30 linux-nvidia - 6.8.0-1027.30 linux-nvidia-64k - 6.8.0-1027.30 linux-nvidia-headers-6.8.0-1027 - 6.8.0-1027.30 linux-nvidia-tools-6.8.0-1027 - 6.8.0-1027.30 linux-tools-6.8.0-1027-nvidia - 6.8.0-1027.30 linux-tools-6.8.0-1027-nvidia-64k - 6.8.0-1027.30 linux-tools-nvidia - 6.8.0-1027.30 linux-tools-nvidia-64k - 6.8.0-1027.30 No subscription required linux-buildinfo-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-buildinfo-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-headers-nvidia-lowlatency - 6.8.0-1027.30.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-uc-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-uc-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-image-unsigned-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-image-unsigned-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-extra-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1027.30.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-nvidia-lowlatency - 6.8.0-1027.30.1 linux-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-nvidia-lowlatency-headers-6.8.0-1027 - 6.8.0-1027.30.1 linux-nvidia-lowlatency-tools-6.8.0-1027 - 6.8.0-1027.30.1 linux-tools-6.8.0-1027-nvidia-lowlatency - 6.8.0-1027.30.1 linux-tools-6.8.0-1027-nvidia-lowlatency-64k - 6.8.0-1027.30.1 linux-tools-nvidia-lowlatency - 6.8.0-1027.30.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1027.30.1 No subscription required linux-aws - 6.8.0-1028.30 linux-aws-cloud-tools-6.8.0-1028 - 6.8.0-1028.30 linux-aws-headers-6.8.0-1028 - 6.8.0-1028.30 linux-aws-lts-24.04 - 6.8.0-1028.30 linux-aws-tools-6.8.0-1028 - 6.8.0-1028.30 linux-buildinfo-6.8.0-1028-aws - 6.8.0-1028.30 linux-cloud-tools-6.8.0-1028-aws - 6.8.0-1028.30 linux-headers-6.8.0-1028-aws - 6.8.0-1028.30 linux-headers-aws - 6.8.0-1028.30 linux-headers-aws-lts-24.04 - 6.8.0-1028.30 linux-image-6.8.0-1028-aws - 6.8.0-1028.30 linux-image-aws - 6.8.0-1028.30 linux-image-aws-lts-24.04 - 6.8.0-1028.30 linux-image-unsigned-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-extra-6.8.0-1028-aws - 6.8.0-1028.30 linux-modules-extra-aws - 6.8.0-1028.30 linux-modules-extra-aws-lts-24.04 - 6.8.0-1028.30 linux-tools-6.8.0-1028-aws - 6.8.0-1028.30 linux-tools-aws - 6.8.0-1028.30 linux-tools-aws-lts-24.04 - 6.8.0-1028.30 No subscription required linux-buildinfo-6.8.0-1029-gcp - 6.8.0-1029.31 linux-buildinfo-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-gcp-headers-6.8.0-1029 - 6.8.0-1029.31 linux-gcp-lts-24.04 - 6.8.0-1029.31 linux-gcp-tools-6.8.0-1029 - 6.8.0-1029.31 linux-headers-6.8.0-1029-gcp - 6.8.0-1029.31 linux-headers-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-headers-gcp-lts-24.04 - 6.8.0-1029.31 linux-image-6.8.0-1029-gcp - 6.8.0-1029.31 linux-image-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-image-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-image-gcp-lts-24.04 - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-gcp - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-6.8.0-1029-gcp - 6.8.0-1029.31 linux-modules-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-gcp - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1029.31 linux-tools-6.8.0-1029-gcp - 6.8.0-1029.31 linux-tools-6.8.0-1029-gcp-64k - 6.8.0-1029.31 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1029.31 linux-tools-gcp-lts-24.04 - 6.8.0-1029.31 No subscription required linux-bpf-dev - 6.8.0-59.61 linux-buildinfo-6.8.0-59-generic - 6.8.0-59.61 linux-buildinfo-6.8.0-59-generic-64k - 6.8.0-59.61 linux-cloud-tools-6.8.0-59 - 6.8.0-59.61 linux-cloud-tools-6.8.0-59-generic - 6.8.0-59.61 linux-cloud-tools-common - 6.8.0-59.61 linux-cloud-tools-generic - 6.8.0-59.61 linux-cloud-tools-virtual - 6.8.0-59.61 linux-crashdump - 6.8.0-59.61 linux-doc - 6.8.0-59.61 linux-generic - 6.8.0-59.61 linux-generic-64k - 6.8.0-59.61 linux-generic-lpae - 6.8.0-59.61 linux-headers-6.8.0-59 - 6.8.0-59.61 linux-headers-6.8.0-59-generic - 6.8.0-59.61 linux-headers-6.8.0-59-generic-64k - 6.8.0-59.61 linux-headers-generic - 6.8.0-59.61 linux-headers-generic-64k - 6.8.0-59.61 linux-headers-generic-lpae - 6.8.0-59.61 linux-headers-kvm - 6.8.0-59.61 linux-headers-laptop-23.10 - 6.8.0-59.61 linux-headers-oem-20.04 - 6.8.0-59.61 linux-headers-oem-20.04b - 6.8.0-59.61 linux-headers-oem-20.04c - 6.8.0-59.61 linux-headers-oem-20.04d - 6.8.0-59.61 linux-headers-oem-22.04 - 6.8.0-59.61 linux-headers-virtual - 6.8.0-59.61 linux-image-6.8.0-59-generic - 6.8.0-59.61 linux-image-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-extra-virtual - 6.8.0-59.61 linux-image-generic - 6.8.0-59.61 linux-image-generic-64k - 6.8.0-59.61 linux-image-generic-lpae - 6.8.0-59.61 linux-image-kvm - 6.8.0-59.61 linux-image-laptop-23.10 - 6.8.0-59.61 linux-image-oem-20.04 - 6.8.0-59.61 linux-image-oem-20.04b - 6.8.0-59.61 linux-image-oem-20.04c - 6.8.0-59.61 linux-image-oem-20.04d - 6.8.0-59.61 linux-image-oem-22.04 - 6.8.0-59.61 linux-image-uc-6.8.0-59-generic - 6.8.0-59.61 linux-image-uc-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-uc-generic - 6.8.0-59.61 linux-image-unsigned-6.8.0-59-generic - 6.8.0-59.61 linux-image-unsigned-6.8.0-59-generic-64k - 6.8.0-59.61 linux-image-virtual - 6.8.0-59.61 linux-kvm - 6.8.0-59.61 linux-laptop-23.10 - 6.8.0-59.61 linux-lib-rust-6.8.0-59-generic - 6.8.0-59.61 linux-libc-dev - 6.8.0-59.61 linux-modules-6.8.0-59-generic - 6.8.0-59.61 linux-modules-6.8.0-59-generic-64k - 6.8.0-59.61 linux-modules-extra-6.8.0-59-generic - 6.8.0-59.61 linux-modules-ipu6-6.8.0-59-generic - 6.8.0-59.61 linux-modules-ipu6-generic - 6.8.0-59.61 linux-modules-iwlwifi-6.8.0-59-generic - 6.8.0-59.61 linux-modules-iwlwifi-generic - 6.8.0-59.61 linux-modules-iwlwifi-oem-20.04 - 6.8.0-59.61 linux-modules-iwlwifi-oem-20.04d - 6.8.0-59.61 linux-modules-iwlwifi-oem-22.04 - 6.8.0-59.61 linux-modules-usbio-6.8.0-59-generic - 6.8.0-59.61 linux-modules-usbio-generic - 6.8.0-59.61 linux-oem-20.04 - 6.8.0-59.61 linux-oem-20.04b - 6.8.0-59.61 linux-oem-20.04c - 6.8.0-59.61 linux-oem-20.04d - 6.8.0-59.61 linux-oem-22.04 - 6.8.0-59.61 linux-source - 6.8.0-59.61 linux-source-6.8.0 - 6.8.0-59.61 linux-tools-6.8.0-59 - 6.8.0-59.61 linux-tools-6.8.0-59-generic - 6.8.0-59.61 linux-tools-6.8.0-59-generic-64k - 6.8.0-59.61 linux-tools-common - 6.8.0-59.61 linux-tools-generic - 6.8.0-59.61 linux-tools-generic-64k - 6.8.0-59.61 linux-tools-generic-lpae - 6.8.0-59.61 linux-tools-host - 6.8.0-59.61 linux-tools-kvm - 6.8.0-59.61 linux-tools-laptop-23.10 - 6.8.0-59.61 linux-tools-oem-20.04 - 6.8.0-59.61 linux-tools-oem-20.04b - 6.8.0-59.61 linux-tools-oem-20.04c - 6.8.0-59.61 linux-tools-oem-20.04d - 6.8.0-59.61 linux-tools-oem-22.04 - 6.8.0-59.61 linux-tools-virtual - 6.8.0-59.61 linux-virtual - 6.8.0-59.61 No subscription required linux-buildinfo-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-buildinfo-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-cloud-tools-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-cloud-tools-lowlatency - 6.8.0-59.61.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-headers-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-headers-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-headers-lowlatency - 6.8.0-59.61.1 linux-headers-lowlatency-64k - 6.8.0-59.61.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-image-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-image-lowlatency - 6.8.0-59.61.1 linux-image-lowlatency-64k - 6.8.0-59.61.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-image-unsigned-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-image-unsigned-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-lowlatency - 6.8.0-59.61.1 linux-lowlatency-64k - 6.8.0-59.61.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-lowlatency-cloud-tools-6.8.0-59 - 6.8.0-59.61.1 linux-lowlatency-headers-6.8.0-59 - 6.8.0-59.61.1 linux-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 linux-lowlatency-lib-rust-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-lowlatency-tools-6.8.0-59 - 6.8.0-59.61.1 linux-modules-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-modules-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-modules-iwlwifi-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-modules-iwlwifi-lowlatency - 6.8.0-59.61.1 linux-tools-6.8.0-59-lowlatency - 6.8.0-59.61.1 linux-tools-6.8.0-59-lowlatency-64k - 6.8.0-59.61.1 linux-tools-lowlatency - 6.8.0-59.61.1 linux-tools-lowlatency-64k - 6.8.0-59.61.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-59.61.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-59.61.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-59.61.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-59.61.1 No subscription required High CVE-2024-56653 USN-7492-2 -- Linux kernel (Real-time) vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; (CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7492-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1021-realtime - 6.8.1-1021.22 linux-cloud-tools-6.8.1-1021-realtime - 6.8.1-1021.22 linux-headers-6.8.1-1021-realtime - 6.8.1-1021.22 linux-headers-realtime - 6.8.1-1021.22 linux-headers-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-6.8.1-1021-realtime - 6.8.1-1021.22 linux-image-realtime - 6.8.1-1021.22 linux-image-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-uc-6.8.1-1021-realtime - 6.8.1-1021.22 linux-image-uc-realtime - 6.8.1-1021.22 linux-image-uc-realtime-hwe-24.04 - 6.8.1-1021.22 linux-image-unsigned-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-extra-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-6.8.1-1021-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-realtime - 6.8.1-1021.22 linux-modules-iwlwifi-realtime-hwe-24.04 - 6.8.1-1021.22 linux-realtime - 6.8.1-1021.22 linux-realtime-cloud-tools-6.8.1-1021 - 6.8.1-1021.22 linux-realtime-headers-6.8.1-1021 - 6.8.1-1021.22 linux-realtime-hwe-24.04 - 6.8.1-1021.22 linux-realtime-tools-6.8.1-1021 - 6.8.1-1021.22 linux-tools-6.8.1-1021-realtime - 6.8.1-1021.22 linux-tools-realtime - 6.8.1-1021.22 linux-tools-realtime-hwe-24.04 - 6.8.1-1021.22 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2024-56653 USN-7493-1 -- Linux kernel (Raspberry Pi) vulnerabilities Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Clock framework and drivers; (CVE-2024-58081) Update Instructions: Run `sudo pro fix USN-7493-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1024-raspi - 6.8.0-1024.28 linux-headers-6.8.0-1024-raspi - 6.8.0-1024.28 linux-headers-raspi - 6.8.0-1024.28 linux-image-6.8.0-1024-raspi - 6.8.0-1024.28 linux-image-raspi - 6.8.0-1024.28 linux-modules-6.8.0-1024-raspi - 6.8.0-1024.28 linux-raspi - 6.8.0-1024.28 linux-raspi-headers-6.8.0-1024 - 6.8.0-1024.28 linux-raspi-tools-6.8.0-1024 - 6.8.0-1024.28 linux-tools-6.8.0-1024-raspi - 6.8.0-1024.28 linux-tools-raspi - 6.8.0-1024.28 No subscription required Medium CVE-2024-58081 USN-7497-1 -- CarrierWave vulnerabilities Ubuntu 24.04 LTS Rikita Ishikawa discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-21305) Norihide Saito discovered that CarrierWave did not correctly sanitize certain inputs. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-49090) Update Instructions: Run `sudo pro fix USN-7497-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-carrierwave - 1.3.2-2ubuntu0.24.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-21305 CVE-2023-49090 USN-7499-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Timer subsystem; (CVE-2025-21813, CVE-2025-21953) Update Instructions: Run `sudo pro fix USN-7499-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1014.14~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-6.11-headers-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-6.11-tools-6.11.0-1014 - 6.11.0-1014.14~24.04.1 linux-azure-edge - 6.11.0-1014.14~24.04.1 linux-azure-fde - 6.11.0-1014.14~24.04.1 linux-azure-fde-edge - 6.11.0-1014.14~24.04.1 linux-buildinfo-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-azure - 6.11.0-1014.14~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1014.14~24.04.1 linux-headers-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-headers-azure - 6.11.0-1014.14~24.04.1 linux-headers-azure-edge - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-image-6.11.0-1014-azure-fde - 6.11.0-1014.14~24.04.1 linux-image-azure - 6.11.0-1014.14~24.04.1 linux-image-azure-edge - 6.11.0-1014.14~24.04.1 linux-image-azure-fde - 6.11.0-1014.14~24.04.1 linux-image-azure-fde-edge - 6.11.0-1014.14~24.04.1 linux-image-unsigned-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-azure - 6.11.0-1014.14~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1014.14~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1014.14~24.04.1 linux-tools-6.11.0-1014-azure - 6.11.0-1014.14~24.04.1 linux-tools-azure - 6.11.0-1014.14~24.04.1 linux-tools-azure-edge - 6.11.0-1014.14~24.04.1 No subscription required Medium CVE-2025-21813 CVE-2025-21953 USN-7500-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Bluetooth drivers; - Microsoft Azure Network Adapter (MANA) driver; (CVE-2025-21953, CVE-2024-56653) Update Instructions: Run `sudo pro fix USN-7500-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.8.0-1028 - 6.8.0-1028.33 linux-azure-fde-lts-24.04 - 6.8.0-1028.33 linux-azure-headers-6.8.0-1028 - 6.8.0-1028.33 linux-azure-lts-24.04 - 6.8.0-1028.33 linux-azure-tools-6.8.0-1028 - 6.8.0-1028.33 linux-buildinfo-6.8.0-1028-azure - 6.8.0-1028.33 linux-cloud-tools-6.8.0-1028-azure - 6.8.0-1028.33 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1028.33 linux-headers-6.8.0-1028-azure - 6.8.0-1028.33 linux-headers-azure-lts-24.04 - 6.8.0-1028.33 linux-image-6.8.0-1028-azure - 6.8.0-1028.33 linux-image-6.8.0-1028-azure-fde - 6.8.0-1028.33 linux-image-azure-fde-lts-24.04 - 6.8.0-1028.33 linux-image-azure-lts-24.04 - 6.8.0-1028.33 linux-image-unsigned-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-extra-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-extra-azure-lts-24.04 - 6.8.0-1028.33 linux-modules-involflt-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1028.33 linux-modules-iwlwifi-6.8.0-1028-azure - 6.8.0-1028.33 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1028.33 linux-tools-6.8.0-1028-azure - 6.8.0-1028.33 linux-tools-azure-lts-24.04 - 6.8.0-1028.33 No subscription required High CVE-2024-56653 CVE-2025-21953 USN-7501-1 -- Django vulnerability Ubuntu 24.04 LTS Elias Myllymäki discovered that Django incorrectly handled stripping large sequences of incomplete HTML tags. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-7501-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.7 python3-django - 3:4.2.11-1ubuntu1.7 No subscription required Medium CVE-2025-32873 USN-7503-1 -- h11 vulnerability Ubuntu 24.04 LTS Jeppe Bonde Weikop discovered that h11 incorrectly handled crafted HTTP requests. A remote attacker could possibly use this issue to smuggle malicious HTTP requests, which could potentially lead to security control bypass and information leakage. Update Instructions: Run `sudo pro fix USN-7503-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-h11 - 0.14.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2025-43859 USN-7504-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS Juraj Šarinay discovered that LibreOffice incorrectly handled verifying PDF signatures. A remote attacker could possibly use this issue to generate PDF files that appear to have a valid signature. Update Instructions: Run `sudo pro fix USN-7504-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.7-0ubuntu0.24.04.4 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.4 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.7-0ubuntu0.24.04.4 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.7-0ubuntu0.24.04.4 libjuh-java - 4:24.2.7-0ubuntu0.24.04.4 libjurt-java - 4:24.2.7-0ubuntu0.24.04.4 liblibreoffice-java - 4:24.2.7-0ubuntu0.24.04.4 liblibreofficekitgtk - 4:24.2.7-0ubuntu0.24.04.4 libofficebean-java - 4:24.2.7-0ubuntu0.24.04.4 libreoffice - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-core - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-drivers - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-base-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-calc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-calc-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-core - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-core-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-doc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-dev-gui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-draw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-draw-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-evolution - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gnome - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gtk3 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-gtk4 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ca - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-cs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-da - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-de - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-dz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-el - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-en-gb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-en-us - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-es - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-et - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-eu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-fi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-fr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-gl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-hi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-hu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-id - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-it - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ja - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-km - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ko - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-nl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-om - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-pt-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-ru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-sv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-tr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-vi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-zh-cn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-help-zh-tw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-impress - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-impress-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-java-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-kf5 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-af - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-am - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ar - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-as - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ast - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-be - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bg - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-bs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ca - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-cs - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-cy - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-da - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-de - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-dz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-el - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-en-gb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-en-za - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-eo - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-es - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-et - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-eu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fa - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-fr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ga - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gd - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-gug - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-he - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-hy - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-id - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-in - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-is - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-it - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ja - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ka - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-km - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kmr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-kn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ko - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-lt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-lv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ml - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-mr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ne - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-nso - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-oc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-om - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-or - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pa-in - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pt - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-pt-br - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ro - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-rw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-si - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ss - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-st - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-sv - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-szl - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ta - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-te - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tg - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-th - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-tr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ts - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ug - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-uk - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-uz - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-ve - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-vi - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-xh - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-za - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zh-cn - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zh-tw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-l10n-zu - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-librelogo - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-math - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-math-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-officebean - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-plasma - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-qt5 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-qt6 - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder-bin - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-report-builder-bin-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-bsh - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-js - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-script-provider-python - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-firebird - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-hsqldb - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-mysql - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-sdbc-postgresql - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-smoketest-data - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-breeze - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-colibre - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-elementary - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-karasa-jaga - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-sifr - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-sukapura - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-tango - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-style-yaru - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-subsequentcheckbase - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-base - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-calc - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-common - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-draw - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-impress - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-math - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-report-builder - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-uiconfig-writer - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-writer - 4:24.2.7-0ubuntu0.24.04.4 libreoffice-writer-nogui - 4:24.2.7-0ubuntu0.24.04.4 libreofficekit-data - 4:24.2.7-0ubuntu0.24.04.4 libreofficekit-dev - 4:24.2.7-0ubuntu0.24.04.4 libridl-java - 4:24.2.7-0ubuntu0.24.04.4 libuno-cppu3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-cppuhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-purpenvhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-sal3t64 - 4:24.2.7-0ubuntu0.24.04.4 libuno-salhelpergcc3-3t64 - 4:24.2.7-0ubuntu0.24.04.4 libunoil-java - 4:24.2.7-0ubuntu0.24.04.4 libunoloader-java - 4:24.2.7-0ubuntu0.24.04.4 python3-access2base - 4:24.2.7-0ubuntu0.24.04.4 python3-scriptforge - 4:24.2.7-0ubuntu0.24.04.4 python3-uno - 4:24.2.7-0ubuntu0.24.04.4 uno-libs-private - 4:24.2.7-0ubuntu0.24.04.4 ure - 4:24.2.7-0ubuntu0.24.04.4 ure-java - 4:24.2.7-0ubuntu0.24.04.4 No subscription required Medium CVE-2025-2866 USN-7505-1 -- Abseil vulnerability Ubuntu 24.04 LTS It was discovered that Abseil incorrectly handled memory with the upper bound of the size argument. An attacker could possibly use this issue to cause a denial of service or memory corruption. Update Instructions: Run `sudo pro fix USN-7505-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libabsl-dev - 20220623.1-3.1ubuntu3.2 libabsl20220623t64 - 20220623.1-3.1ubuntu3.2 No subscription required Medium CVE-2025-0838 USN-7507-1 -- Rack vulnerabilities Ubuntu 24.04 LTS It was discovered that Rack incorrectly handled deleted rack sessions. An attacker could possibly use this issue to expose sensitive information or to gain unauthorized access to user accounts. (CVE-2025-32441) It was discovered that Rack incorrectly limited the number of parameters in a web request. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-46727) Update Instructions: Run `sudo pro fix USN-7507-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.3 No subscription required Medium CVE-2025-46727 CVE-2025-32441 USN-7508-1 -- Open VM Tools vulnerability Ubuntu 24.04 LTS It was discovered that Open VM Tools incorrectly handled certain file operations. An attacker in a guest could use this issue to perform insecure file operations and possibly elevate privileges in the guest. Update Instructions: Run `sudo pro fix USN-7508-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: open-vm-tools - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-containerinfo - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-desktop - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-dev - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-salt-minion - 2:12.4.5-1~ubuntu0.24.04.2 open-vm-tools-sdmp - 2:12.4.5-1~ubuntu0.24.04.2 No subscription required Medium CVE-2025-22247 USN-7509-1 -- .NET vulnerability Ubuntu 24.04 LTS It was discovered that .NET did not properly handle file names and paths under certain conditions. An attacker could possibly use this issue to perform spoofing over a network. Update Instructions: Run `sudo pro fix USN-7509-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.116-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.116-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.116-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.116-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.116-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.116-8.0.16-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.16-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.16-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.16-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.16-0ubuntu1~24.04.1 No subscription required Medium CVE-2025-26646 USN-7513-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56372, CVE-2025-21639, CVE-2024-57897, CVE-2024-56770, CVE-2024-57898, CVE-2025-21655, CVE-2024-56667, CVE-2024-41013, CVE-2024-57888, CVE-2025-21658, CVE-2024-57911, CVE-2024-56654, CVE-2024-57904, CVE-2024-56664, CVE-2024-57806, CVE-2024-56758, CVE-2024-57912, CVE-2025-21649, CVE-2024-56369, CVE-2025-21656, CVE-2025-21643, CVE-2024-57884, CVE-2025-21640, CVE-2024-56769, CVE-2024-57939, CVE-2025-21635, CVE-2024-57902, CVE-2024-36476, CVE-2025-21646, CVE-2024-57887, CVE-2024-57882, CVE-2024-57792, CVE-2024-56759, CVE-2024-57901, CVE-2024-56764, CVE-2025-21654, CVE-2024-57899, CVE-2025-21664, CVE-2024-56715, CVE-2024-56760, CVE-2024-57926, CVE-2024-57938, CVE-2025-21637, CVE-2024-55881, CVE-2024-57916, CVE-2024-57908, CVE-2024-57910, CVE-2024-57892, CVE-2024-57890, CVE-2024-56662, CVE-2024-57793, CVE-2024-47408, CVE-2024-49568, CVE-2024-57946, CVE-2024-53690, CVE-2024-56716, CVE-2024-57801, CVE-2024-56670, CVE-2024-56709, CVE-2024-57885, CVE-2024-57791, CVE-2024-38608, CVE-2024-56763, CVE-2024-57906, CVE-2024-47736, CVE-2024-56761, CVE-2024-56659, CVE-2025-21636, CVE-2024-57913, CVE-2024-56710, CVE-2025-21660, CVE-2024-57945, CVE-2024-39282, CVE-2024-53687, CVE-2024-57907, CVE-2024-53179, CVE-2025-21659, CVE-2024-57805, CVE-2024-57889, CVE-2024-57940, CVE-2025-21645, CVE-2024-56660, CVE-2024-56718, CVE-2024-57802, CVE-2024-56767, CVE-2024-56717, CVE-2024-58087, CVE-2025-21647, CVE-2025-21650, CVE-2024-57895, CVE-2025-21632, CVE-2024-54193, CVE-2024-57893, CVE-2025-21652, CVE-2025-21634, CVE-2024-56652, CVE-2024-57929, CVE-2024-57804, CVE-2024-57925, CVE-2024-57932, CVE-2024-54683, CVE-2025-21663, CVE-2024-56665, CVE-2024-54455, CVE-2025-21642, CVE-2024-57931, CVE-2025-21971, CVE-2024-56656, CVE-2025-21651, CVE-2024-49571, CVE-2025-21631, CVE-2024-56675, CVE-2024-53125, CVE-2025-21938, CVE-2024-57879, CVE-2024-56657, CVE-2024-57807, CVE-2024-57841, CVE-2024-57903, CVE-2024-53685, CVE-2024-57896, CVE-2024-57900, CVE-2024-57883, CVE-2024-58237, CVE-2025-21638, CVE-2024-55639, CVE-2025-21653, CVE-2025-21648, CVE-2024-54460, CVE-2024-57933, CVE-2024-55916, CVE-2024-57917, CVE-2025-21662) Update Instructions: Run `sudo pro fix USN-7513-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1026-ibm - 6.8.0-1026.26 linux-headers-6.8.0-1026-ibm - 6.8.0-1026.26 linux-headers-ibm - 6.8.0-1026.26 linux-headers-ibm-classic - 6.8.0-1026.26 linux-headers-ibm-lts-24.04 - 6.8.0-1026.26 linux-ibm - 6.8.0-1026.26 linux-ibm-classic - 6.8.0-1026.26 linux-ibm-headers-6.8.0-1026 - 6.8.0-1026.26 linux-ibm-lts-24.04 - 6.8.0-1026.26 linux-ibm-tools-6.8.0-1026 - 6.8.0-1026.26 linux-image-6.8.0-1026-ibm - 6.8.0-1026.26 linux-image-ibm - 6.8.0-1026.26 linux-image-ibm-classic - 6.8.0-1026.26 linux-image-ibm-lts-24.04 - 6.8.0-1026.26 linux-image-unsigned-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-extra-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-6.8.0-1026-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-ibm - 6.8.0-1026.26 linux-modules-iwlwifi-ibm-classic - 6.8.0-1026.26 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1026.26 linux-tools-6.8.0-1026-ibm - 6.8.0-1026.26 linux-tools-ibm - 6.8.0-1026.26 linux-tools-ibm-classic - 6.8.0-1026.26 linux-tools-ibm-lts-24.04 - 6.8.0-1026.26 No subscription required linux-buildinfo-6.8.0-1026-oracle - 6.8.0-1026.27 linux-buildinfo-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-headers-6.8.0-1026-oracle - 6.8.0-1026.27 linux-headers-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-headers-oracle - 6.8.0-1026.27 linux-headers-oracle-64k - 6.8.0-1026.27 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-headers-oracle-lts-24.04 - 6.8.0-1026.27 linux-image-6.8.0-1026-oracle - 6.8.0-1026.27 linux-image-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-image-oracle - 6.8.0-1026.27 linux-image-oracle-64k - 6.8.0-1026.27 linux-image-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-image-oracle-lts-24.04 - 6.8.0-1026.27 linux-image-unsigned-6.8.0-1026-oracle - 6.8.0-1026.27 linux-image-unsigned-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-modules-6.8.0-1026-oracle - 6.8.0-1026.27 linux-modules-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-modules-extra-6.8.0-1026-oracle - 6.8.0-1026.27 linux-modules-extra-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-oracle - 6.8.0-1026.27 linux-oracle-64k - 6.8.0-1026.27 linux-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-oracle-headers-6.8.0-1026 - 6.8.0-1026.27 linux-oracle-lts-24.04 - 6.8.0-1026.27 linux-oracle-tools-6.8.0-1026 - 6.8.0-1026.27 linux-tools-6.8.0-1026-oracle - 6.8.0-1026.27 linux-tools-6.8.0-1026-oracle-64k - 6.8.0-1026.27 linux-tools-oracle - 6.8.0-1026.27 linux-tools-oracle-64k - 6.8.0-1026.27 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1026.27 linux-tools-oracle-lts-24.04 - 6.8.0-1026.27 No subscription required linux-aws - 6.8.0-1029.31 linux-aws-cloud-tools-6.8.0-1029 - 6.8.0-1029.31 linux-aws-headers-6.8.0-1029 - 6.8.0-1029.31 linux-aws-lts-24.04 - 6.8.0-1029.31 linux-aws-tools-6.8.0-1029 - 6.8.0-1029.31 linux-buildinfo-6.8.0-1029-aws - 6.8.0-1029.31 linux-cloud-tools-6.8.0-1029-aws - 6.8.0-1029.31 linux-headers-6.8.0-1029-aws - 6.8.0-1029.31 linux-headers-aws - 6.8.0-1029.31 linux-headers-aws-lts-24.04 - 6.8.0-1029.31 linux-image-6.8.0-1029-aws - 6.8.0-1029.31 linux-image-aws - 6.8.0-1029.31 linux-image-aws-lts-24.04 - 6.8.0-1029.31 linux-image-unsigned-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-extra-6.8.0-1029-aws - 6.8.0-1029.31 linux-modules-extra-aws - 6.8.0-1029.31 linux-modules-extra-aws-lts-24.04 - 6.8.0-1029.31 linux-tools-6.8.0-1029-aws - 6.8.0-1029.31 linux-tools-aws - 6.8.0-1029.31 linux-tools-aws-lts-24.04 - 6.8.0-1029.31 No subscription required linux-bpf-dev - 6.8.0-60.63 linux-buildinfo-6.8.0-60-generic - 6.8.0-60.63 linux-buildinfo-6.8.0-60-generic-64k - 6.8.0-60.63 linux-cloud-tools-6.8.0-60 - 6.8.0-60.63 linux-cloud-tools-6.8.0-60-generic - 6.8.0-60.63 linux-cloud-tools-common - 6.8.0-60.63 linux-cloud-tools-generic - 6.8.0-60.63 linux-cloud-tools-virtual - 6.8.0-60.63 linux-crashdump - 6.8.0-60.63 linux-doc - 6.8.0-60.63 linux-generic - 6.8.0-60.63 linux-generic-64k - 6.8.0-60.63 linux-generic-lpae - 6.8.0-60.63 linux-headers-6.8.0-60 - 6.8.0-60.63 linux-headers-6.8.0-60-generic - 6.8.0-60.63 linux-headers-6.8.0-60-generic-64k - 6.8.0-60.63 linux-headers-generic - 6.8.0-60.63 linux-headers-generic-64k - 6.8.0-60.63 linux-headers-generic-lpae - 6.8.0-60.63 linux-headers-kvm - 6.8.0-60.63 linux-headers-laptop-23.10 - 6.8.0-60.63 linux-headers-oem-20.04 - 6.8.0-60.63 linux-headers-oem-20.04b - 6.8.0-60.63 linux-headers-oem-20.04c - 6.8.0-60.63 linux-headers-oem-20.04d - 6.8.0-60.63 linux-headers-oem-22.04 - 6.8.0-60.63 linux-headers-virtual - 6.8.0-60.63 linux-image-6.8.0-60-generic - 6.8.0-60.63 linux-image-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-extra-virtual - 6.8.0-60.63 linux-image-generic - 6.8.0-60.63 linux-image-generic-64k - 6.8.0-60.63 linux-image-generic-lpae - 6.8.0-60.63 linux-image-kvm - 6.8.0-60.63 linux-image-laptop-23.10 - 6.8.0-60.63 linux-image-oem-20.04 - 6.8.0-60.63 linux-image-oem-20.04b - 6.8.0-60.63 linux-image-oem-20.04c - 6.8.0-60.63 linux-image-oem-20.04d - 6.8.0-60.63 linux-image-oem-22.04 - 6.8.0-60.63 linux-image-uc-6.8.0-60-generic - 6.8.0-60.63 linux-image-uc-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-uc-generic - 6.8.0-60.63 linux-image-unsigned-6.8.0-60-generic - 6.8.0-60.63 linux-image-unsigned-6.8.0-60-generic-64k - 6.8.0-60.63 linux-image-virtual - 6.8.0-60.63 linux-kvm - 6.8.0-60.63 linux-laptop-23.10 - 6.8.0-60.63 linux-lib-rust-6.8.0-60-generic - 6.8.0-60.63 linux-libc-dev - 6.8.0-60.63 linux-modules-6.8.0-60-generic - 6.8.0-60.63 linux-modules-6.8.0-60-generic-64k - 6.8.0-60.63 linux-modules-extra-6.8.0-60-generic - 6.8.0-60.63 linux-modules-ipu6-6.8.0-60-generic - 6.8.0-60.63 linux-modules-ipu6-generic - 6.8.0-60.63 linux-modules-iwlwifi-6.8.0-60-generic - 6.8.0-60.63 linux-modules-iwlwifi-generic - 6.8.0-60.63 linux-modules-iwlwifi-oem-20.04 - 6.8.0-60.63 linux-modules-iwlwifi-oem-20.04d - 6.8.0-60.63 linux-modules-iwlwifi-oem-22.04 - 6.8.0-60.63 linux-modules-usbio-6.8.0-60-generic - 6.8.0-60.63 linux-modules-usbio-generic - 6.8.0-60.63 linux-oem-20.04 - 6.8.0-60.63 linux-oem-20.04b - 6.8.0-60.63 linux-oem-20.04c - 6.8.0-60.63 linux-oem-20.04d - 6.8.0-60.63 linux-oem-22.04 - 6.8.0-60.63 linux-source - 6.8.0-60.63 linux-source-6.8.0 - 6.8.0-60.63 linux-tools-6.8.0-60 - 6.8.0-60.63 linux-tools-6.8.0-60-generic - 6.8.0-60.63 linux-tools-6.8.0-60-generic-64k - 6.8.0-60.63 linux-tools-common - 6.8.0-60.63 linux-tools-generic - 6.8.0-60.63 linux-tools-generic-64k - 6.8.0-60.63 linux-tools-generic-lpae - 6.8.0-60.63 linux-tools-host - 6.8.0-60.63 linux-tools-kvm - 6.8.0-60.63 linux-tools-laptop-23.10 - 6.8.0-60.63 linux-tools-oem-20.04 - 6.8.0-60.63 linux-tools-oem-20.04b - 6.8.0-60.63 linux-tools-oem-20.04c - 6.8.0-60.63 linux-tools-oem-20.04d - 6.8.0-60.63 linux-tools-oem-22.04 - 6.8.0-60.63 linux-tools-virtual - 6.8.0-60.63 linux-virtual - 6.8.0-60.63 No subscription required linux-buildinfo-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-buildinfo-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-cloud-tools-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-cloud-tools-lowlatency - 6.8.0-60.63.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-headers-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-headers-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-headers-lowlatency - 6.8.0-60.63.1 linux-headers-lowlatency-64k - 6.8.0-60.63.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-image-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-image-lowlatency - 6.8.0-60.63.1 linux-image-lowlatency-64k - 6.8.0-60.63.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-image-unsigned-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-image-unsigned-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-lowlatency - 6.8.0-60.63.1 linux-lowlatency-64k - 6.8.0-60.63.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-lowlatency-cloud-tools-6.8.0-60 - 6.8.0-60.63.1 linux-lowlatency-headers-6.8.0-60 - 6.8.0-60.63.1 linux-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 linux-lowlatency-lib-rust-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-lowlatency-tools-6.8.0-60 - 6.8.0-60.63.1 linux-modules-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-modules-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-modules-iwlwifi-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-modules-iwlwifi-lowlatency - 6.8.0-60.63.1 linux-tools-6.8.0-60-lowlatency - 6.8.0-60.63.1 linux-tools-6.8.0-60-lowlatency-64k - 6.8.0-60.63.1 linux-tools-lowlatency - 6.8.0-60.63.1 linux-tools-lowlatency-64k - 6.8.0-60.63.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-60.63.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-60.63.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-60.63.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-60.63.1 No subscription required Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21938 CVE-2025-21971 USN-7513-2 -- Linux kernel (Real-time) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56372, CVE-2025-21639, CVE-2024-57897, CVE-2024-56770, CVE-2024-57898, CVE-2025-21655, CVE-2024-56667, CVE-2024-41013, CVE-2024-57888, CVE-2025-21658, CVE-2024-57911, CVE-2024-56654, CVE-2024-57904, CVE-2024-56664, CVE-2024-57806, CVE-2024-56758, CVE-2024-57912, CVE-2025-21649, CVE-2024-56369, CVE-2025-21656, CVE-2025-21643, CVE-2024-57884, CVE-2025-21640, CVE-2024-56769, CVE-2024-57939, CVE-2025-21635, CVE-2024-57902, CVE-2024-36476, CVE-2025-21646, CVE-2024-57887, CVE-2024-57882, CVE-2024-57792, CVE-2024-56759, CVE-2024-57901, CVE-2024-56764, CVE-2025-21654, CVE-2024-57899, CVE-2025-21664, CVE-2024-56715, CVE-2024-56760, CVE-2024-57926, CVE-2024-57938, CVE-2025-21637, CVE-2024-55881, CVE-2024-57916, CVE-2024-57908, CVE-2024-57910, CVE-2024-57892, CVE-2024-57890, CVE-2024-56662, CVE-2024-57793, CVE-2024-47408, CVE-2024-49568, CVE-2024-57946, CVE-2024-53690, CVE-2024-56716, CVE-2024-57801, CVE-2024-56670, CVE-2024-56709, CVE-2024-57885, CVE-2024-57791, CVE-2024-38608, CVE-2024-56763, CVE-2024-57906, CVE-2024-47736, CVE-2024-56761, CVE-2024-56659, CVE-2025-21636, CVE-2024-57913, CVE-2024-56710, CVE-2025-21660, CVE-2024-57945, CVE-2024-39282, CVE-2024-53687, CVE-2024-57907, CVE-2024-53179, CVE-2025-21659, CVE-2024-57805, CVE-2024-57889, CVE-2024-57940, CVE-2025-21645, CVE-2024-56660, CVE-2024-56718, CVE-2024-57802, CVE-2024-56767, CVE-2024-56717, CVE-2024-58087, CVE-2025-21647, CVE-2025-21650, CVE-2024-57895, CVE-2025-21632, CVE-2024-54193, CVE-2024-57893, CVE-2025-21652, CVE-2025-21634, CVE-2024-56652, CVE-2024-57929, CVE-2024-57804, CVE-2024-57925, CVE-2024-57932, CVE-2024-54683, CVE-2025-21663, CVE-2024-56665, CVE-2024-54455, CVE-2025-21642, CVE-2024-57931, CVE-2025-21971, CVE-2024-56656, CVE-2025-21651, CVE-2024-49571, CVE-2025-21631, CVE-2024-56675, CVE-2024-53125, CVE-2025-21938, CVE-2024-57879, CVE-2024-56657, CVE-2024-57807, CVE-2024-57841, CVE-2024-57903, CVE-2024-53685, CVE-2024-57896, CVE-2024-57900, CVE-2024-57883, CVE-2024-58237, CVE-2025-21638, CVE-2024-55639, CVE-2025-21653, CVE-2025-21648, CVE-2024-54460, CVE-2024-57933, CVE-2024-55916, CVE-2024-57917, CVE-2025-21662) Update Instructions: Run `sudo pro fix USN-7513-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.1-1022-realtime - 6.8.1-1022.23 linux-cloud-tools-6.8.1-1022-realtime - 6.8.1-1022.23 linux-headers-6.8.1-1022-realtime - 6.8.1-1022.23 linux-headers-realtime - 6.8.1-1022.23 linux-image-6.8.1-1022-realtime - 6.8.1-1022.23 linux-image-realtime - 6.8.1-1022.23 linux-image-uc-6.8.1-1022-realtime - 6.8.1-1022.23 linux-image-uc-realtime - 6.8.1-1022.23 linux-image-unsigned-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-extra-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-iwlwifi-6.8.1-1022-realtime - 6.8.1-1022.23 linux-modules-iwlwifi-realtime - 6.8.1-1022.23 linux-realtime - 6.8.1-1022.23 linux-realtime-cloud-tools-6.8.1-1022 - 6.8.1-1022.23 linux-realtime-headers-6.8.1-1022 - 6.8.1-1022.23 linux-realtime-tools-6.8.1-1022 - 6.8.1-1022.23 linux-tools-6.8.1-1022-realtime - 6.8.1-1022.23 linux-tools-realtime - 6.8.1-1022.23 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21938 CVE-2025-21971 USN-7513-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2025-21648, CVE-2025-21645, CVE-2024-56767, CVE-2025-21664, CVE-2025-21636, CVE-2024-57898, CVE-2024-56667, CVE-2024-57912, CVE-2024-47408, CVE-2024-56761, CVE-2024-56665, CVE-2024-57887, CVE-2024-54683, CVE-2024-56662, CVE-2024-57910, CVE-2024-38608, CVE-2024-56710, CVE-2025-21656, CVE-2024-57885, CVE-2024-53125, CVE-2024-56675, CVE-2024-57895, CVE-2024-56660, CVE-2025-21638, CVE-2024-57932, CVE-2024-57807, CVE-2024-56759, CVE-2024-57883, CVE-2025-21643, CVE-2024-54193, CVE-2024-57879, CVE-2024-54460, CVE-2024-41013, CVE-2024-56654, CVE-2024-55916, CVE-2024-57897, CVE-2024-58087, CVE-2024-57904, CVE-2024-57893, CVE-2025-21652, CVE-2024-57925, CVE-2024-47736, CVE-2024-57802, CVE-2024-49571, CVE-2024-57916, CVE-2024-57801, CVE-2025-21647, CVE-2024-56763, CVE-2024-57903, CVE-2024-57899, CVE-2024-57908, CVE-2024-57900, CVE-2024-57911, CVE-2024-57902, CVE-2024-57938, CVE-2024-56760, CVE-2025-21642, CVE-2025-21971, CVE-2024-57933, CVE-2024-57917, CVE-2024-53179, CVE-2024-57896, CVE-2024-57906, CVE-2024-56716, CVE-2024-39282, CVE-2024-57806, CVE-2025-21938, CVE-2024-55881, CVE-2024-57931, CVE-2024-56717, CVE-2024-56369, CVE-2025-21640, CVE-2024-57888, CVE-2024-57804, CVE-2024-57907, CVE-2024-53687, CVE-2024-57940, CVE-2024-57929, CVE-2025-21637, CVE-2024-57805, CVE-2024-56372, CVE-2025-21646, CVE-2024-57913, CVE-2024-57901, CVE-2024-57889, CVE-2024-56770, CVE-2024-57945, CVE-2024-56659, CVE-2024-57946, CVE-2024-57890, CVE-2024-36476, CVE-2024-57882, CVE-2024-53685, CVE-2024-57791, CVE-2024-55639, CVE-2024-56718, CVE-2024-57792, CVE-2025-21662, CVE-2024-57793, CVE-2024-54455, CVE-2025-21632, CVE-2024-56715, CVE-2024-56652, CVE-2024-57939, CVE-2024-56657, CVE-2025-21658, CVE-2025-21655, CVE-2025-21635, CVE-2024-56656, CVE-2025-21660, CVE-2025-21634, CVE-2025-21631, CVE-2024-57892, CVE-2024-57884, CVE-2024-58237, CVE-2025-21659, CVE-2024-57926, CVE-2024-53690, CVE-2025-21654, CVE-2024-57841, CVE-2025-21639, CVE-2025-21663, CVE-2024-56670, CVE-2024-56758, CVE-2024-56764, CVE-2024-56709, CVE-2024-49568, CVE-2024-56769, CVE-2025-21653, CVE-2025-21651, CVE-2025-21650, CVE-2024-56664, CVE-2025-21649) Update Instructions: Run `sudo pro fix USN-7513-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-oem - 6.8.0-1028.28 linux-headers-6.8.0-1028-oem - 6.8.0-1028.28 linux-headers-oem-24.04 - 6.8.0-1028.28 linux-headers-oem-24.04a - 6.8.0-1028.28 linux-image-6.8.0-1028-oem - 6.8.0-1028.28 linux-image-oem-24.04 - 6.8.0-1028.28 linux-image-oem-24.04a - 6.8.0-1028.28 linux-image-uc-6.8.0-1028-oem - 6.8.0-1028.28 linux-image-uc-oem-24.04 - 6.8.0-1028.28 linux-image-uc-oem-24.04a - 6.8.0-1028.28 linux-image-unsigned-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-ipu6-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-ipu6-oem-24.04 - 6.8.0-1028.28 linux-modules-ipu6-oem-24.04a - 6.8.0-1028.28 linux-modules-iwlwifi-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1028.28 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1028.28 linux-modules-usbio-6.8.0-1028-oem - 6.8.0-1028.28 linux-modules-usbio-oem-24.04 - 6.8.0-1028.28 linux-modules-usbio-oem-24.04a - 6.8.0-1028.28 linux-oem-24.04 - 6.8.0-1028.28 linux-oem-24.04a - 6.8.0-1028.28 linux-oem-6.8-headers-6.8.0-1028 - 6.8.0-1028.28 linux-oem-6.8-tools-6.8.0-1028 - 6.8.0-1028.28 linux-tools-6.8.0-1028-oem - 6.8.0-1028.28 linux-tools-oem-24.04 - 6.8.0-1028.28 linux-tools-oem-24.04a - 6.8.0-1028.28 No subscription required linux-azure-cloud-tools-6.8.0-1029 - 6.8.0-1029.34 linux-azure-fde-lts-24.04 - 6.8.0-1029.34 linux-azure-headers-6.8.0-1029 - 6.8.0-1029.34 linux-azure-lts-24.04 - 6.8.0-1029.34 linux-azure-tools-6.8.0-1029 - 6.8.0-1029.34 linux-buildinfo-6.8.0-1029-azure - 6.8.0-1029.34 linux-cloud-tools-6.8.0-1029-azure - 6.8.0-1029.34 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1029.34 linux-headers-6.8.0-1029-azure - 6.8.0-1029.34 linux-headers-azure-lts-24.04 - 6.8.0-1029.34 linux-image-6.8.0-1029-azure - 6.8.0-1029.34 linux-image-6.8.0-1029-azure-fde - 6.8.0-1029.34 linux-image-azure-fde-lts-24.04 - 6.8.0-1029.34 linux-image-azure-lts-24.04 - 6.8.0-1029.34 linux-image-unsigned-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-extra-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-extra-azure-lts-24.04 - 6.8.0-1029.34 linux-modules-involflt-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1029.34 linux-modules-iwlwifi-6.8.0-1029-azure - 6.8.0-1029.34 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1029.34 linux-tools-6.8.0-1029-azure - 6.8.0-1029.34 linux-tools-azure-lts-24.04 - 6.8.0-1029.34 No subscription required Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21938 CVE-2025-21971 USN-7514-1 -- Linux kernel (NVIDIA) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-57901, CVE-2024-57889, CVE-2024-53687, CVE-2024-57804, CVE-2024-56709, CVE-2025-21631, CVE-2024-57908, CVE-2025-21645, CVE-2024-47736, CVE-2024-57896, CVE-2024-38608, CVE-2025-21637, CVE-2024-57898, CVE-2024-53179, CVE-2024-56710, CVE-2024-57802, CVE-2025-21659, CVE-2024-57903, CVE-2024-56764, CVE-2024-57892, CVE-2024-56717, CVE-2024-57938, CVE-2024-55881, CVE-2024-56718, CVE-2025-21647, CVE-2024-39282, CVE-2024-57879, CVE-2025-21643, CVE-2024-57792, CVE-2024-56657, CVE-2024-53685, CVE-2024-54455, CVE-2024-56656, CVE-2025-21638, CVE-2024-57907, CVE-2024-54193, CVE-2024-57806, CVE-2025-21655, CVE-2024-56670, CVE-2024-57904, CVE-2024-56369, CVE-2024-57945, CVE-2024-56759, CVE-2024-56716, CVE-2025-21651, CVE-2024-57911, CVE-2024-56372, CVE-2024-36476, CVE-2024-57888, CVE-2024-41013, CVE-2024-57882, CVE-2025-21636, CVE-2025-21971, CVE-2024-57841, CVE-2024-56760, CVE-2024-57805, CVE-2024-56758, CVE-2025-21648, CVE-2024-57917, CVE-2024-57913, CVE-2025-21658, CVE-2024-57926, CVE-2024-57939, CVE-2024-57791, CVE-2024-57883, CVE-2024-58087, CVE-2024-56665, CVE-2024-57887, CVE-2025-21635, CVE-2024-56662, CVE-2024-57893, CVE-2024-57916, CVE-2024-56675, CVE-2024-56763, CVE-2024-56664, CVE-2024-53690, CVE-2025-21663, CVE-2024-56761, CVE-2024-57910, CVE-2025-21660, CVE-2024-57885, CVE-2024-57899, CVE-2025-21650, CVE-2025-21888, CVE-2024-57801, CVE-2024-58237, CVE-2024-56767, CVE-2024-57895, CVE-2024-57912, CVE-2024-56654, CVE-2025-21646, CVE-2024-54683, CVE-2024-57931, CVE-2024-49568, CVE-2025-21639, CVE-2025-21632, CVE-2024-56769, CVE-2024-57807, CVE-2025-21656, CVE-2024-55639, CVE-2024-56652, CVE-2024-57933, CVE-2024-57793, CVE-2025-21662, CVE-2024-57940, CVE-2024-56715, CVE-2024-57906, CVE-2024-57900, CVE-2024-56660, CVE-2024-57897, CVE-2024-49571, CVE-2024-57890, CVE-2025-21642, CVE-2025-21634, CVE-2025-21938, CVE-2024-57929, CVE-2025-21664, CVE-2024-53125, CVE-2024-54460, CVE-2024-57925, CVE-2025-21652, CVE-2025-21653, CVE-2024-55916, CVE-2024-47408, CVE-2024-57902, CVE-2025-21654, CVE-2025-21649, CVE-2024-56770, CVE-2024-57932, CVE-2024-57946, CVE-2025-21640, CVE-2024-57884, CVE-2024-56667, CVE-2024-56659) Update Instructions: Run `sudo pro fix USN-7514-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-buildinfo-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-cloud-tools-nvidia - 6.8.0-1028.31 linux-headers-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-headers-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-headers-nvidia - 6.8.0-1028.31 linux-headers-nvidia-64k - 6.8.0-1028.31 linux-image-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-image-nvidia - 6.8.0-1028.31 linux-image-nvidia-64k - 6.8.0-1028.31 linux-image-uc-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-uc-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-image-unsigned-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-image-unsigned-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-extra-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-modules-nvidia-fs-nvidia - 6.8.0-1028.31 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1028.31 linux-nvidia - 6.8.0-1028.31 linux-nvidia-64k - 6.8.0-1028.31 linux-nvidia-headers-6.8.0-1028 - 6.8.0-1028.31 linux-nvidia-tools-6.8.0-1028 - 6.8.0-1028.31 linux-tools-6.8.0-1028-nvidia - 6.8.0-1028.31 linux-tools-6.8.0-1028-nvidia-64k - 6.8.0-1028.31 linux-tools-nvidia - 6.8.0-1028.31 linux-tools-nvidia-64k - 6.8.0-1028.31 No subscription required linux-buildinfo-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-buildinfo-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-headers-nvidia-lowlatency - 6.8.0-1028.31.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-uc-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-uc-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-image-unsigned-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-image-unsigned-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-extra-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1028.31.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-nvidia-lowlatency - 6.8.0-1028.31.1 linux-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-nvidia-lowlatency-headers-6.8.0-1028 - 6.8.0-1028.31.1 linux-nvidia-lowlatency-tools-6.8.0-1028 - 6.8.0-1028.31.1 linux-tools-6.8.0-1028-nvidia-lowlatency - 6.8.0-1028.31.1 linux-tools-6.8.0-1028-nvidia-lowlatency-64k - 6.8.0-1028.31.1 linux-tools-nvidia-lowlatency - 6.8.0-1028.31.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1028.31.1 No subscription required Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21888 CVE-2025-21938 CVE-2025-21971 USN-7515-1 -- Linux kernel (GKE) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2025-21660, CVE-2025-21659, CVE-2024-56718, CVE-2024-56675, CVE-2025-21631, CVE-2025-21664, CVE-2025-21655, CVE-2025-21662, CVE-2024-57804, CVE-2025-21656, CVE-2024-57910, CVE-2025-21647, CVE-2025-21634, CVE-2024-56716, CVE-2024-56709, CVE-2024-56770, CVE-2024-57888, CVE-2024-57793, CVE-2024-56670, CVE-2024-57931, CVE-2025-21640, CVE-2025-21648, CVE-2024-57913, CVE-2024-56710, CVE-2024-44964, CVE-2024-57911, CVE-2025-21654, CVE-2024-57890, CVE-2024-56654, CVE-2024-56767, CVE-2025-21650, CVE-2024-54460, CVE-2025-21635, CVE-2024-57791, CVE-2024-49568, CVE-2024-57879, CVE-2024-57929, CVE-2024-56715, CVE-2024-57899, CVE-2024-53687, CVE-2024-57900, CVE-2024-57903, CVE-2024-54455, CVE-2024-56763, CVE-2024-58087, CVE-2025-21638, CVE-2024-57892, CVE-2024-57884, CVE-2024-57792, CVE-2024-57904, CVE-2024-56759, CVE-2024-56659, CVE-2024-57885, CVE-2024-57889, CVE-2024-56657, CVE-2024-56667, CVE-2024-47408, CVE-2024-57805, CVE-2025-21637, CVE-2024-57893, CVE-2024-57946, CVE-2024-57806, CVE-2024-36476, CVE-2025-21646, CVE-2024-56369, CVE-2024-57917, CVE-2025-21649, CVE-2024-54193, CVE-2024-56717, CVE-2024-41013, CVE-2024-55916, CVE-2024-57933, CVE-2024-57907, CVE-2024-54683, CVE-2024-57887, CVE-2024-56760, CVE-2024-56652, CVE-2024-57940, CVE-2024-57906, CVE-2024-57939, CVE-2024-56372, CVE-2024-56665, CVE-2024-57925, CVE-2025-21938, CVE-2024-57895, CVE-2024-58237, CVE-2024-56664, CVE-2024-56660, CVE-2024-55639, CVE-2025-21632, CVE-2024-57841, CVE-2024-39282, CVE-2025-21651, CVE-2024-53125, CVE-2024-57807, CVE-2025-21643, CVE-2024-57883, CVE-2024-57898, CVE-2024-57897, CVE-2024-53179, CVE-2024-57932, CVE-2024-57916, CVE-2024-53685, CVE-2024-57908, CVE-2025-21652, CVE-2025-21658, CVE-2024-57926, CVE-2024-57801, CVE-2024-55881, CVE-2024-57901, CVE-2025-21653, CVE-2025-21642, CVE-2024-57882, CVE-2024-57912, CVE-2024-56662, CVE-2025-21639, CVE-2025-21971, CVE-2024-47736, CVE-2024-56761, CVE-2024-57945, CVE-2025-21663, CVE-2024-49571, CVE-2024-56758, CVE-2024-53690, CVE-2024-38608, CVE-2024-56656, CVE-2025-21645, CVE-2024-56764, CVE-2024-57896, CVE-2024-57938, CVE-2024-57902, CVE-2025-21636, CVE-2024-56769, CVE-2024-57802) Update Instructions: Run `sudo pro fix USN-7515-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-gke - 6.8.0-1025.29 linux-gke - 6.8.0-1025.29 linux-gke-headers-6.8.0-1025 - 6.8.0-1025.29 linux-gke-tools-6.8.0-1025 - 6.8.0-1025.29 linux-headers-6.8.0-1025-gke - 6.8.0-1025.29 linux-headers-gke - 6.8.0-1025.29 linux-image-6.8.0-1025-gke - 6.8.0-1025.29 linux-image-gke - 6.8.0-1025.29 linux-image-unsigned-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-extra-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-iwlwifi-6.8.0-1025-gke - 6.8.0-1025.29 linux-modules-iwlwifi-gke - 6.8.0-1025.29 linux-tools-6.8.0-1025-gke - 6.8.0-1025.29 linux-tools-gke - 6.8.0-1025.29 No subscription required Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-44964 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21938 CVE-2025-21971 USN-7515-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-57945, CVE-2024-56717, CVE-2024-57806, CVE-2025-21659, CVE-2024-57899, CVE-2024-57933, CVE-2024-56675, CVE-2025-21653, CVE-2024-44964, CVE-2024-57892, CVE-2024-56760, CVE-2024-57906, CVE-2024-57792, CVE-2024-54455, CVE-2025-21656, CVE-2024-56656, CVE-2024-57884, CVE-2025-21638, CVE-2024-56758, CVE-2025-21663, CVE-2024-54460, CVE-2024-57911, CVE-2024-55639, CVE-2024-57890, CVE-2025-21632, CVE-2024-57896, CVE-2024-56657, CVE-2024-54683, CVE-2025-21640, CVE-2025-21655, CVE-2025-21651, CVE-2024-57940, CVE-2024-56709, CVE-2024-57904, CVE-2024-47408, CVE-2024-53687, CVE-2025-21639, CVE-2024-57897, CVE-2025-21647, CVE-2024-57907, CVE-2025-21652, CVE-2024-56662, CVE-2024-57882, CVE-2024-56763, CVE-2025-21938, CVE-2024-57802, CVE-2024-36476, CVE-2024-57938, CVE-2024-57883, CVE-2024-57879, CVE-2024-57908, CVE-2024-57939, CVE-2024-57805, CVE-2024-56664, CVE-2024-56761, CVE-2024-56659, CVE-2025-21631, CVE-2024-56715, CVE-2025-21664, CVE-2024-56710, CVE-2024-56372, CVE-2024-57932, CVE-2024-57898, CVE-2025-21971, CVE-2024-47736, CVE-2024-41013, CVE-2024-57931, CVE-2024-56759, CVE-2024-57893, CVE-2025-21635, CVE-2024-53690, CVE-2024-57807, CVE-2024-56652, CVE-2024-57926, CVE-2024-57901, CVE-2024-57793, CVE-2024-39282, CVE-2024-49568, CVE-2024-57903, CVE-2024-57913, CVE-2024-53685, CVE-2024-57912, CVE-2024-56667, CVE-2024-54193, CVE-2024-55881, CVE-2024-56369, CVE-2024-58237, CVE-2024-57929, CVE-2024-53179, CVE-2024-56718, CVE-2025-21650, CVE-2025-21642, CVE-2025-21636, CVE-2025-21649, CVE-2025-21643, CVE-2024-58087, CVE-2025-21662, CVE-2025-21634, CVE-2024-57791, CVE-2025-21660, CVE-2024-49571, CVE-2024-56716, CVE-2024-57804, CVE-2024-57801, CVE-2025-21648, CVE-2024-56769, CVE-2025-21637, CVE-2024-57895, CVE-2024-57910, CVE-2024-57885, CVE-2024-56665, CVE-2024-55916, CVE-2024-57917, CVE-2024-57900, CVE-2024-57841, CVE-2025-21654, CVE-2024-56660, CVE-2025-21646, CVE-2024-57925, CVE-2024-57888, CVE-2025-21645, CVE-2025-21658, CVE-2024-57887, CVE-2024-56767, CVE-2024-57902, CVE-2024-56764, CVE-2024-57916, CVE-2024-56654, CVE-2024-57946, CVE-2024-56670, CVE-2024-56770, CVE-2024-57889, CVE-2024-38608, CVE-2024-53125) Update Instructions: Run `sudo pro fix USN-7515-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-cloud-tools-gkeop - 6.8.0-1012.14 linux-cloud-tools-gkeop-6.8 - 6.8.0-1012.14 linux-gkeop - 6.8.0-1012.14 linux-gkeop-6.8 - 6.8.0-1012.14 linux-gkeop-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-gkeop-headers-6.8.0-1012 - 6.8.0-1012.14 linux-gkeop-tools-6.8.0-1012 - 6.8.0-1012.14 linux-headers-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-headers-gkeop - 6.8.0-1012.14 linux-headers-gkeop-6.8 - 6.8.0-1012.14 linux-image-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-image-gkeop - 6.8.0-1012.14 linux-image-gkeop-6.8 - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-modules-extra-gkeop - 6.8.0-1012.14 linux-modules-extra-gkeop-6.8 - 6.8.0-1012.14 linux-tools-6.8.0-1012-gkeop - 6.8.0-1012.14 linux-tools-gkeop - 6.8.0-1012.14 linux-tools-gkeop-6.8 - 6.8.0-1012.14 No subscription required linux-buildinfo-6.8.0-1030-gcp - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-gcp-headers-6.8.0-1030 - 6.8.0-1030.32 linux-gcp-lts-24.04 - 6.8.0-1030.32 linux-gcp-tools-6.8.0-1030 - 6.8.0-1030.32 linux-headers-6.8.0-1030-gcp - 6.8.0-1030.32 linux-headers-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-headers-gcp-lts-24.04 - 6.8.0-1030.32 linux-image-6.8.0-1030-gcp - 6.8.0-1030.32 linux-image-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-image-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-image-gcp-lts-24.04 - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-gcp - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-6.8.0-1030-gcp - 6.8.0-1030.32 linux-modules-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-extra-6.8.0-1030-gcp - 6.8.0-1030.32 linux-modules-extra-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1030.32 linux-tools-6.8.0-1030-gcp - 6.8.0-1030.32 linux-tools-6.8.0-1030-gcp-64k - 6.8.0-1030.32 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1030.32 linux-tools-gcp-lts-24.04 - 6.8.0-1030.32 No subscription required Medium CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-44964 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21938 CVE-2025-21971 USN-7520-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS It was discovered that PostgreSQL incorrectly handled the GB18030 encoding. An attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7520-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.9-0ubuntu0.24.04.1 libecpg-dev - 16.9-0ubuntu0.24.04.1 libecpg6 - 16.9-0ubuntu0.24.04.1 libpgtypes3 - 16.9-0ubuntu0.24.04.1 libpq-dev - 16.9-0ubuntu0.24.04.1 libpq5 - 16.9-0ubuntu0.24.04.1 postgresql-16 - 16.9-0ubuntu0.24.04.1 postgresql-client-16 - 16.9-0ubuntu0.24.04.1 postgresql-doc-16 - 16.9-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.9-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.9-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.9-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.9-0ubuntu0.24.04.1 No subscription required Medium CVE-2025-4207 USN-7521-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Serial ATA and Parallel ATA drivers; - Drivers core; - Network block device driver; - Bluetooth drivers; - Character device driver; - TPM device driver; - Clock framework and drivers; - Hardware crypto device drivers; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - NVIDIA Tegra memory controller driver; - Fastrpc Driver; - Network drivers; - Operating Performance Points (OPP) driver; - PCI subsystem; - x86 platform drivers; - PPS (Pulse Per Second) driver; - PTP clock framework; - Remote Processor subsystem; - Real Time Clock drivers; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Media staging drivers; - Trusted Execution Environment drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Framebuffer layer; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - BPF subsystem; - Timer subsystem; - KVM subsystem; - Networking core; - ptr_ring data structure definitions; - Networking subsytem; - Amateur Radio drivers; - L3 Master device support module; - TCP network protocol; - XFRM subsystem; - Tracing infrastructure; - io_uring subsystem; - Process Accounting mechanism; - Perf events; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Workqueue subsystem; - Memory management; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - Wireless networking; - Key management; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; - SoC audio core drivers; - SOF drivers; (CVE-2025-21737, CVE-2025-21711, CVE-2025-21987, CVE-2025-21848, CVE-2024-49570, CVE-2025-21762, CVE-2025-21738, CVE-2025-21712, CVE-2025-21719, CVE-2025-21870, CVE-2024-57984, CVE-2025-21815, CVE-2025-21744, CVE-2024-58058, CVE-2024-58078, CVE-2024-57990, CVE-2024-54458, CVE-2025-21899, CVE-2025-21814, CVE-2025-21746, CVE-2024-54456, CVE-2025-21739, CVE-2024-58057, CVE-2025-21855, CVE-2025-21758, CVE-2024-58006, CVE-2024-58007, CVE-2025-21720, CVE-2024-58090, CVE-2025-21852, CVE-2024-57982, CVE-2024-58013, CVE-2024-58082, CVE-2025-21825, CVE-2024-58072, CVE-2024-57996, CVE-2025-21787, CVE-2025-21742, CVE-2025-21705, CVE-2025-21829, CVE-2024-58060, CVE-2025-21811, CVE-2025-21900, CVE-2025-21853, CVE-2025-21809, CVE-2025-21938, CVE-2025-21728, CVE-2025-21785, CVE-2025-21732, CVE-2025-21888, CVE-2025-21768, CVE-2025-21875, CVE-2025-21721, CVE-2025-21766, CVE-2025-21892, CVE-2024-57953, CVE-2025-21772, CVE-2025-21735, CVE-2024-58017, CVE-2024-58086, CVE-2024-58084, CVE-2025-21761, CVE-2024-58008, CVE-2024-57988, CVE-2025-21874, CVE-2024-58011, CVE-2025-21706, CVE-2024-57999, CVE-2025-21858, CVE-2024-58061, CVE-2025-21727, CVE-2025-21780, CVE-2024-58051, CVE-2025-21791, CVE-2025-21788, CVE-2025-21786, CVE-2024-58012, CVE-2024-58010, CVE-2024-58001, CVE-2025-21844, CVE-2025-21708, CVE-2024-57834, CVE-2025-21873, CVE-2025-21704, CVE-2025-21765, CVE-2025-21839, CVE-2025-21723, CVE-2024-57974, CVE-2025-21876, CVE-2025-21782, CVE-2025-21866, CVE-2024-58076, CVE-2025-21724, CVE-2025-21895, CVE-2025-21770, CVE-2025-21835, CVE-2024-58052, CVE-2025-21827, CVE-2024-58069, CVE-2025-21828, CVE-2025-21734, CVE-2025-21781, CVE-2025-21971, CVE-2025-21775, CVE-2024-52559, CVE-2024-58020, CVE-2025-21713, CVE-2024-58068, CVE-2024-58018, CVE-2025-21806, CVE-2025-21802, CVE-2025-21731, CVE-2025-21741, CVE-2025-21847, CVE-2025-21767, CVE-2024-58003, CVE-2024-57993, CVE-2025-21725, CVE-2025-21796, CVE-2025-21764, CVE-2025-21862, CVE-2025-21733, CVE-2024-58075, CVE-2025-21808, CVE-2024-58034, CVE-2025-21707, CVE-2024-58080, CVE-2025-21784, CVE-2024-57994, CVE-2025-21890, CVE-2025-21754, CVE-2024-58063, CVE-2025-21826, CVE-2025-21821, CVE-2024-58079, CVE-2024-58056, CVE-2025-21798, CVE-2024-58077, CVE-2024-58019, CVE-2025-21748, CVE-2025-21759, CVE-2024-58004, CVE-2024-58081, CVE-2024-57978, CVE-2025-21865, CVE-2024-58002, CVE-2025-21810, CVE-2025-21743, CVE-2024-57989, CVE-2025-21718, CVE-2024-57987, CVE-2025-21877, CVE-2024-57973, CVE-2024-58070, CVE-2024-58071, CVE-2025-21891, CVE-2024-58021, CVE-2024-58016, CVE-2024-58005, CVE-2025-21760, CVE-2025-21883, CVE-2025-21878, CVE-2025-21881, CVE-2025-21838, CVE-2025-21783, CVE-2024-57986, CVE-2025-21793, CVE-2025-21859, CVE-2025-21792, CVE-2025-21820, CVE-2025-21799, CVE-2025-21750, CVE-2025-21795, CVE-2025-21854, CVE-2025-21836, CVE-2025-21726, CVE-2025-21846, CVE-2025-21864, CVE-2024-57977, CVE-2025-21887, CVE-2025-21710, CVE-2025-21889, CVE-2025-21812, CVE-2025-21773, CVE-2024-57852, CVE-2025-21856, CVE-2025-21871, CVE-2025-21763, CVE-2024-58064, CVE-2025-21804, CVE-2024-58055, CVE-2025-21898, CVE-2025-21776, CVE-2025-21869, CVE-2025-21745, CVE-2025-21736, CVE-2025-21716, CVE-2024-57981, CVE-2024-57979, CVE-2025-21715, CVE-2024-57998, CVE-2025-21790, CVE-2024-58085, CVE-2025-21749, CVE-2024-58088, CVE-2025-21753, CVE-2025-21851, CVE-2024-58054, CVE-2025-21830, CVE-2025-21832, CVE-2024-57980, CVE-2025-21885, CVE-2025-21863, CVE-2024-58053, CVE-2025-21823, CVE-2025-21857, CVE-2024-58083, CVE-2024-58014, CVE-2025-21816, CVE-2025-21779, CVE-2025-21872, CVE-2024-57997, CVE-2025-21867, CVE-2024-57985, CVE-2025-21831, CVE-2025-21801, CVE-2025-21868, CVE-2025-21849) Update Instructions: Run `sudo pro fix USN-7521-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.11.0-1015.15~24.04.1 linux-azure-6.11-cloud-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-6.11-headers-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-6.11-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-azure-edge - 6.11.0-1015.15~24.04.1 linux-azure-fde - 6.11.0-1015.15~24.04.1 linux-azure-fde-edge - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-buildinfo-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-cloud-tools-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-cloud-tools-azure - 6.11.0-1015.15~24.04.1 linux-cloud-tools-azure-edge - 6.11.0-1015.15~24.04.1 linux-gcp - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-headers-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-lib-rust-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-gcp-6.11-tools-6.11.0-1015 - 6.11.0-1015.15~24.04.1 linux-gcp-64k - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-headers-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-headers-azure - 6.11.0-1015.15~24.04.1 linux-headers-azure-edge - 6.11.0-1015.15~24.04.1 linux-headers-gcp - 6.11.0-1015.15~24.04.1 linux-headers-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-azure-fde - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-image-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-azure - 6.11.0-1015.15~24.04.1 linux-image-azure-edge - 6.11.0-1015.15~24.04.1 linux-image-azure-fde - 6.11.0-1015.15~24.04.1 linux-image-azure-fde-edge - 6.11.0-1015.15~24.04.1 linux-image-gcp - 6.11.0-1015.15~24.04.1 linux-image-gcp-64k - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-image-unsigned-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-modules-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-modules-extra-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-extra-azure - 6.11.0-1015.15~24.04.1 linux-modules-extra-azure-edge - 6.11.0-1015.15~24.04.1 linux-modules-extra-gcp - 6.11.0-1015.15~24.04.1 linux-modules-extra-gcp-64k - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-azure - 6.11.0-1015.15~24.04.1 linux-modules-iwlwifi-azure-edge - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-azure - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-gcp - 6.11.0-1015.15~24.04.1 linux-tools-6.11.0-1015-gcp-64k - 6.11.0-1015.15~24.04.1 linux-tools-azure - 6.11.0-1015.15~24.04.1 linux-tools-azure-edge - 6.11.0-1015.15~24.04.1 linux-tools-gcp - 6.11.0-1015.15~24.04.1 linux-tools-gcp-64k - 6.11.0-1015.15~24.04.1 No subscription required linux-buildinfo-6.11.0-1022-oem - 6.11.0-1022.22 linux-headers-6.11.0-1022-oem - 6.11.0-1022.22 linux-headers-oem-24.04b - 6.11.0-1022.22 linux-image-6.11.0-1022-oem - 6.11.0-1022.22 linux-image-oem-24.04b - 6.11.0-1022.22 linux-image-uc-6.11.0-1022-oem - 6.11.0-1022.22 linux-image-uc-oem-24.04b - 6.11.0-1022.22 linux-image-unsigned-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu6-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu6-oem-24.04b - 6.11.0-1022.22 linux-modules-ipu7-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-ipu7-oem-24.04b - 6.11.0-1022.22 linux-modules-iwlwifi-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-iwlwifi-oem-24.04b - 6.11.0-1022.22 linux-modules-usbio-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-usbio-oem-24.04b - 6.11.0-1022.22 linux-modules-vision-6.11.0-1022-oem - 6.11.0-1022.22 linux-modules-vision-oem-24.04b - 6.11.0-1022.22 linux-oem-24.04b - 6.11.0-1022.22 linux-oem-6.11-headers-6.11.0-1022 - 6.11.0-1022.22 linux-oem-6.11-tools-6.11.0-1022 - 6.11.0-1022.22 linux-tools-6.11.0-1022-oem - 6.11.0-1022.22 linux-tools-oem-24.04b - 6.11.0-1022.22 No subscription required linux-buildinfo-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-buildinfo-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-cloud-tools-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-cloud-tools-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-cloud-tools-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-cloud-tools-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-cloud-tools-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-headers-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-headers-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-headers-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-headers-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-hwe-6.11-cloud-tools-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-hwe-6.11-headers-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-hwe-6.11-lib-rust-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-hwe-6.11-tools-6.11.0-26 - 6.11.0-26.26~24.04.1 linux-image-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-extra-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-extra-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-uc-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-uc-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-uc-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-uc-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-image-unsigned-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-image-unsigned-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-image-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-image-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-modules-extra-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu6-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu6-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-ipu6-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-ipu7-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-ipu7-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-ipu7-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-usbio-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-usbio-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-usbio-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-modules-vision-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-modules-vision-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-modules-vision-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-6.11.0-26-generic - 6.11.0-26.26~24.04.1 linux-tools-6.11.0-26-generic-64k - 6.11.0-26.26~24.04.1 linux-tools-generic-64k-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-generic-64k-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-generic-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-generic-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-tools-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-tools-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 linux-virtual-hwe-24.04 - 6.11.0-26.26~24.04.1 linux-virtual-hwe-24.04-edge - 6.11.0-26.26~24.04.1 No subscription required Medium CVE-2024-49570 CVE-2024-52559 CVE-2024-54456 CVE-2024-54458 CVE-2024-57834 CVE-2024-57852 CVE-2024-57953 CVE-2024-57973 CVE-2024-57974 CVE-2024-57977 CVE-2024-57978 CVE-2024-57979 CVE-2024-57980 CVE-2024-57981 CVE-2024-57982 CVE-2024-57984 CVE-2024-57985 CVE-2024-57986 CVE-2024-57987 CVE-2024-57988 CVE-2024-57989 CVE-2024-57990 CVE-2024-57993 CVE-2024-57994 CVE-2024-57996 CVE-2024-57997 CVE-2024-57998 CVE-2024-57999 CVE-2024-58001 CVE-2024-58002 CVE-2024-58003 CVE-2024-58004 CVE-2024-58005 CVE-2024-58006 CVE-2024-58007 CVE-2024-58008 CVE-2024-58010 CVE-2024-58011 CVE-2024-58012 CVE-2024-58013 CVE-2024-58014 CVE-2024-58016 CVE-2024-58017 CVE-2024-58018 CVE-2024-58019 CVE-2024-58020 CVE-2024-58021 CVE-2024-58034 CVE-2024-58051 CVE-2024-58052 CVE-2024-58053 CVE-2024-58054 CVE-2024-58055 CVE-2024-58056 CVE-2024-58057 CVE-2024-58058 CVE-2024-58060 CVE-2024-58061 CVE-2024-58063 CVE-2024-58064 CVE-2024-58068 CVE-2024-58069 CVE-2024-58070 CVE-2024-58071 CVE-2024-58072 CVE-2024-58075 CVE-2024-58076 CVE-2024-58077 CVE-2024-58078 CVE-2024-58079 CVE-2024-58080 CVE-2024-58081 CVE-2024-58082 CVE-2024-58083 CVE-2024-58084 CVE-2024-58085 CVE-2024-58086 CVE-2024-58088 CVE-2024-58090 CVE-2025-21704 CVE-2025-21705 CVE-2025-21706 CVE-2025-21707 CVE-2025-21708 CVE-2025-21710 CVE-2025-21711 CVE-2025-21712 CVE-2025-21713 CVE-2025-21715 CVE-2025-21716 CVE-2025-21718 CVE-2025-21719 CVE-2025-21720 CVE-2025-21721 CVE-2025-21723 CVE-2025-21724 CVE-2025-21725 CVE-2025-21726 CVE-2025-21727 CVE-2025-21728 CVE-2025-21731 CVE-2025-21732 CVE-2025-21733 CVE-2025-21734 CVE-2025-21735 CVE-2025-21736 CVE-2025-21737 CVE-2025-21738 CVE-2025-21739 CVE-2025-21741 CVE-2025-21742 CVE-2025-21743 CVE-2025-21744 CVE-2025-21745 CVE-2025-21746 CVE-2025-21748 CVE-2025-21749 CVE-2025-21750 CVE-2025-21753 CVE-2025-21754 CVE-2025-21758 CVE-2025-21759 CVE-2025-21760 CVE-2025-21761 CVE-2025-21762 CVE-2025-21763 CVE-2025-21764 CVE-2025-21765 CVE-2025-21766 CVE-2025-21767 CVE-2025-21768 CVE-2025-21770 CVE-2025-21772 CVE-2025-21773 CVE-2025-21775 CVE-2025-21776 CVE-2025-21779 CVE-2025-21780 CVE-2025-21781 CVE-2025-21782 CVE-2025-21783 CVE-2025-21784 CVE-2025-21785 CVE-2025-21786 CVE-2025-21787 CVE-2025-21788 CVE-2025-21790 CVE-2025-21791 CVE-2025-21792 CVE-2025-21793 CVE-2025-21795 CVE-2025-21796 CVE-2025-21798 CVE-2025-21799 CVE-2025-21801 CVE-2025-21802 CVE-2025-21804 CVE-2025-21806 CVE-2025-21808 CVE-2025-21809 CVE-2025-21810 CVE-2025-21811 CVE-2025-21812 CVE-2025-21814 CVE-2025-21815 CVE-2025-21816 CVE-2025-21820 CVE-2025-21821 CVE-2025-21823 CVE-2025-21825 CVE-2025-21826 CVE-2025-21827 CVE-2025-21828 CVE-2025-21829 CVE-2025-21830 CVE-2025-21831 CVE-2025-21832 CVE-2025-21835 CVE-2025-21836 CVE-2025-21838 CVE-2025-21839 CVE-2025-21844 CVE-2025-21846 CVE-2025-21847 CVE-2025-21848 CVE-2025-21849 CVE-2025-21851 CVE-2025-21852 CVE-2025-21853 CVE-2025-21854 CVE-2025-21855 CVE-2025-21856 CVE-2025-21857 CVE-2025-21858 CVE-2025-21859 CVE-2025-21862 CVE-2025-21863 CVE-2025-21864 CVE-2025-21865 CVE-2025-21866 CVE-2025-21867 CVE-2025-21868 CVE-2025-21869 CVE-2025-21870 CVE-2025-21871 CVE-2025-21872 CVE-2025-21873 CVE-2025-21874 CVE-2025-21875 CVE-2025-21876 CVE-2025-21877 CVE-2025-21878 CVE-2025-21881 CVE-2025-21883 CVE-2025-21885 CVE-2025-21887 CVE-2025-21888 CVE-2025-21889 CVE-2025-21890 CVE-2025-21891 CVE-2025-21892 CVE-2025-21895 CVE-2025-21898 CVE-2025-21899 CVE-2025-21900 CVE-2025-21938 CVE-2025-21971 CVE-2025-21987 USN-7521-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Serial ATA and Parallel ATA drivers; - Drivers core; - Network block device driver; - Bluetooth drivers; - Character device driver; - TPM device driver; - Clock framework and drivers; - Hardware crypto device drivers; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - NVIDIA Tegra memory controller driver; - Fastrpc Driver; - Network drivers; - Operating Performance Points (OPP) driver; - PCI subsystem; - x86 platform drivers; - PPS (Pulse Per Second) driver; - PTP clock framework; - Remote Processor subsystem; - Real Time Clock drivers; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - SPI subsystem; - Media staging drivers; - Trusted Execution Environment drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Framebuffer layer; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - BPF subsystem; - Timer subsystem; - KVM subsystem; - Networking core; - ptr_ring data structure definitions; - Networking subsytem; - Amateur Radio drivers; - L3 Master device support module; - TCP network protocol; - XFRM subsystem; - Tracing infrastructure; - io_uring subsystem; - Process Accounting mechanism; - Perf events; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Workqueue subsystem; - Memory management; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - Wireless networking; - Key management; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; - SoC audio core drivers; - SOF drivers; (CVE-2025-21799, CVE-2025-21765, CVE-2024-57834, CVE-2025-21971, CVE-2025-21855, CVE-2024-58019, CVE-2025-21987, CVE-2025-21754, CVE-2025-21779, CVE-2024-57986, CVE-2025-21809, CVE-2025-21887, CVE-2025-21744, CVE-2024-58014, CVE-2025-21892, CVE-2025-21848, CVE-2024-58051, CVE-2024-58085, CVE-2025-21862, CVE-2024-57981, CVE-2024-57987, CVE-2024-58053, CVE-2024-58063, CVE-2024-58079, CVE-2025-21875, CVE-2025-21715, CVE-2024-58004, CVE-2025-21857, CVE-2025-21856, CVE-2025-21938, CVE-2024-58082, CVE-2025-21815, CVE-2025-21864, CVE-2024-52559, CVE-2024-58078, CVE-2024-57989, CVE-2024-58001, CVE-2025-21889, CVE-2025-21739, CVE-2024-58005, CVE-2025-21829, CVE-2024-58069, CVE-2025-21712, CVE-2025-21846, CVE-2025-21883, CVE-2025-21852, CVE-2025-21808, CVE-2025-21900, CVE-2025-21888, CVE-2025-21784, CVE-2025-21838, CVE-2024-58054, CVE-2025-21781, CVE-2025-21737, CVE-2024-58013, CVE-2025-21885, CVE-2025-21877, CVE-2024-58010, CVE-2025-21844, CVE-2024-58012, CVE-2024-58083, CVE-2025-21783, CVE-2025-21798, CVE-2024-57973, CVE-2024-57982, CVE-2025-21708, CVE-2024-58003, CVE-2025-21786, CVE-2025-21750, CVE-2025-21870, CVE-2025-21745, CVE-2024-58081, CVE-2024-57979, CVE-2025-21718, CVE-2025-21816, CVE-2025-21868, CVE-2025-21731, CVE-2025-21814, CVE-2025-21826, CVE-2024-58006, CVE-2025-21821, CVE-2024-57852, CVE-2025-21746, CVE-2025-21874, CVE-2025-21866, CVE-2025-21770, CVE-2025-21899, CVE-2025-21804, CVE-2025-21723, CVE-2025-21742, CVE-2024-57988, CVE-2024-58034, CVE-2025-21733, CVE-2024-57980, CVE-2025-21782, CVE-2025-21711, CVE-2024-58090, CVE-2025-21761, CVE-2025-21851, CVE-2025-21828, CVE-2024-58068, CVE-2024-58018, CVE-2024-58064, CVE-2025-21869, CVE-2025-21772, CVE-2025-21758, CVE-2025-21793, CVE-2024-58017, CVE-2025-21835, CVE-2025-21775, CVE-2025-21719, CVE-2024-57998, CVE-2024-58002, CVE-2024-57993, CVE-2025-21847, CVE-2025-21760, CVE-2025-21796, CVE-2024-58075, CVE-2024-58077, CVE-2025-21773, CVE-2025-21790, CVE-2025-21872, CVE-2025-21895, CVE-2025-21732, CVE-2025-21871, CVE-2024-58058, CVE-2025-21749, CVE-2025-21830, CVE-2025-21704, CVE-2025-21720, CVE-2025-21748, CVE-2025-21726, CVE-2025-21801, CVE-2024-58076, CVE-2025-21881, CVE-2025-21831, CVE-2025-21724, CVE-2024-58086, CVE-2025-21812, CVE-2024-57985, CVE-2025-21795, CVE-2025-21725, CVE-2025-21762, CVE-2025-21788, CVE-2024-58080, CVE-2025-21839, CVE-2024-58057, CVE-2025-21706, CVE-2024-58011, CVE-2025-21832, CVE-2024-58061, CVE-2025-21710, CVE-2025-21734, CVE-2025-21836, CVE-2024-54456, CVE-2024-58008, CVE-2025-21743, CVE-2024-58071, CVE-2025-21707, CVE-2025-21791, CVE-2025-21767, CVE-2024-57974, CVE-2024-58021, CVE-2025-21849, CVE-2025-21827, CVE-2024-58084, CVE-2024-58016, CVE-2024-58072, CVE-2025-21802, CVE-2024-58055, CVE-2025-21853, CVE-2024-57997, CVE-2025-21858, CVE-2024-57999, CVE-2025-21780, CVE-2025-21876, CVE-2024-58088, CVE-2025-21820, CVE-2025-21753, CVE-2025-21766, CVE-2025-21768, CVE-2025-21898, CVE-2025-21785, CVE-2024-54458, CVE-2024-58060, CVE-2024-49570, CVE-2025-21759, CVE-2024-57953, CVE-2024-57977, CVE-2025-21810, CVE-2025-21735, CVE-2025-21728, CVE-2025-21865, CVE-2024-58007, CVE-2025-21776, CVE-2025-21859, CVE-2025-21721, CVE-2025-21823, CVE-2024-58070, CVE-2024-57996, CVE-2024-58056, CVE-2024-58020, CVE-2025-21741, CVE-2025-21806, CVE-2025-21727, CVE-2025-21736, CVE-2025-21787, CVE-2025-21763, CVE-2025-21811, CVE-2025-21873, CVE-2025-21890, CVE-2024-58052, CVE-2025-21705, CVE-2025-21713, CVE-2025-21863, CVE-2025-21716, CVE-2025-21825, CVE-2025-21792, CVE-2025-21854, CVE-2025-21738, CVE-2024-57990, CVE-2024-57994, CVE-2024-57978, CVE-2025-21878, CVE-2025-21867, CVE-2025-21764, CVE-2024-57984, CVE-2025-21891) Update Instructions: Run `sudo pro fix USN-7521-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-buildinfo-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-cloud-tools-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-cloud-tools-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-headers-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-headers-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-headers-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-image-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-image-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-image-unsigned-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-image-unsigned-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-headers-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-lowlatency-hwe-6.11-tools-6.11.0-1014 - 6.11.0-1014.15~24.04.1 linux-modules-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-modules-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-modules-iwlwifi-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-tools-6.11.0-1014-lowlatency - 6.11.0-1014.15~24.04.1 linux-tools-6.11.0-1014-lowlatency-64k - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-64k-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-64k-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-hwe-24.04 - 6.11.0-1014.15~24.04.1 linux-tools-lowlatency-hwe-24.04-edge - 6.11.0-1014.15~24.04.1 No subscription required Medium CVE-2024-49570 CVE-2024-52559 CVE-2024-54456 CVE-2024-54458 CVE-2024-57834 CVE-2024-57852 CVE-2024-57953 CVE-2024-57973 CVE-2024-57974 CVE-2024-57977 CVE-2024-57978 CVE-2024-57979 CVE-2024-57980 CVE-2024-57981 CVE-2024-57982 CVE-2024-57984 CVE-2024-57985 CVE-2024-57986 CVE-2024-57987 CVE-2024-57988 CVE-2024-57989 CVE-2024-57990 CVE-2024-57993 CVE-2024-57994 CVE-2024-57996 CVE-2024-57997 CVE-2024-57998 CVE-2024-57999 CVE-2024-58001 CVE-2024-58002 CVE-2024-58003 CVE-2024-58004 CVE-2024-58005 CVE-2024-58006 CVE-2024-58007 CVE-2024-58008 CVE-2024-58010 CVE-2024-58011 CVE-2024-58012 CVE-2024-58013 CVE-2024-58014 CVE-2024-58016 CVE-2024-58017 CVE-2024-58018 CVE-2024-58019 CVE-2024-58020 CVE-2024-58021 CVE-2024-58034 CVE-2024-58051 CVE-2024-58052 CVE-2024-58053 CVE-2024-58054 CVE-2024-58055 CVE-2024-58056 CVE-2024-58057 CVE-2024-58058 CVE-2024-58060 CVE-2024-58061 CVE-2024-58063 CVE-2024-58064 CVE-2024-58068 CVE-2024-58069 CVE-2024-58070 CVE-2024-58071 CVE-2024-58072 CVE-2024-58075 CVE-2024-58076 CVE-2024-58077 CVE-2024-58078 CVE-2024-58079 CVE-2024-58080 CVE-2024-58081 CVE-2024-58082 CVE-2024-58083 CVE-2024-58084 CVE-2024-58085 CVE-2024-58086 CVE-2024-58088 CVE-2024-58090 CVE-2025-21704 CVE-2025-21705 CVE-2025-21706 CVE-2025-21707 CVE-2025-21708 CVE-2025-21710 CVE-2025-21711 CVE-2025-21712 CVE-2025-21713 CVE-2025-21715 CVE-2025-21716 CVE-2025-21718 CVE-2025-21719 CVE-2025-21720 CVE-2025-21721 CVE-2025-21723 CVE-2025-21724 CVE-2025-21725 CVE-2025-21726 CVE-2025-21727 CVE-2025-21728 CVE-2025-21731 CVE-2025-21732 CVE-2025-21733 CVE-2025-21734 CVE-2025-21735 CVE-2025-21736 CVE-2025-21737 CVE-2025-21738 CVE-2025-21739 CVE-2025-21741 CVE-2025-21742 CVE-2025-21743 CVE-2025-21744 CVE-2025-21745 CVE-2025-21746 CVE-2025-21748 CVE-2025-21749 CVE-2025-21750 CVE-2025-21753 CVE-2025-21754 CVE-2025-21758 CVE-2025-21759 CVE-2025-21760 CVE-2025-21761 CVE-2025-21762 CVE-2025-21763 CVE-2025-21764 CVE-2025-21765 CVE-2025-21766 CVE-2025-21767 CVE-2025-21768 CVE-2025-21770 CVE-2025-21772 CVE-2025-21773 CVE-2025-21775 CVE-2025-21776 CVE-2025-21779 CVE-2025-21780 CVE-2025-21781 CVE-2025-21782 CVE-2025-21783 CVE-2025-21784 CVE-2025-21785 CVE-2025-21786 CVE-2025-21787 CVE-2025-21788 CVE-2025-21790 CVE-2025-21791 CVE-2025-21792 CVE-2025-21793 CVE-2025-21795 CVE-2025-21796 CVE-2025-21798 CVE-2025-21799 CVE-2025-21801 CVE-2025-21802 CVE-2025-21804 CVE-2025-21806 CVE-2025-21808 CVE-2025-21809 CVE-2025-21810 CVE-2025-21811 CVE-2025-21812 CVE-2025-21814 CVE-2025-21815 CVE-2025-21816 CVE-2025-21820 CVE-2025-21821 CVE-2025-21823 CVE-2025-21825 CVE-2025-21826 CVE-2025-21827 CVE-2025-21828 CVE-2025-21829 CVE-2025-21830 CVE-2025-21831 CVE-2025-21832 CVE-2025-21835 CVE-2025-21836 CVE-2025-21838 CVE-2025-21839 CVE-2025-21844 CVE-2025-21846 CVE-2025-21847 CVE-2025-21848 CVE-2025-21849 CVE-2025-21851 CVE-2025-21852 CVE-2025-21853 CVE-2025-21854 CVE-2025-21855 CVE-2025-21856 CVE-2025-21857 CVE-2025-21858 CVE-2025-21859 CVE-2025-21862 CVE-2025-21863 CVE-2025-21864 CVE-2025-21865 CVE-2025-21866 CVE-2025-21867 CVE-2025-21868 CVE-2025-21869 CVE-2025-21870 CVE-2025-21871 CVE-2025-21872 CVE-2025-21873 CVE-2025-21874 CVE-2025-21875 CVE-2025-21876 CVE-2025-21877 CVE-2025-21878 CVE-2025-21881 CVE-2025-21883 CVE-2025-21885 CVE-2025-21887 CVE-2025-21888 CVE-2025-21889 CVE-2025-21890 CVE-2025-21891 CVE-2025-21892 CVE-2025-21895 CVE-2025-21898 CVE-2025-21899 CVE-2025-21900 CVE-2025-21938 CVE-2025-21971 CVE-2025-21987 USN-7522-1 -- Linux kernel (Azure, N-Series) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - Ublk userspace block driver; - Virtio block driver; - Bluetooth drivers; - DMA engine subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Multiple devices driver; - Media drivers; - Microchip PCI driver; - Network drivers; - Mellanox network drivers; - Microsoft Azure Network Adapter (MANA) driver; - STMicroelectronics network drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - SCSI subsystem; - USB Gadget drivers; - TDX Guest driver; - AFS file system; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - File systems infrastructure; - Network file systems library; - NILFS2 file system; - Overlay file system; - SMB network file system; - VLANs driver; - Memory management; - LAPB network protocol; - io_uring subsystem; - BPF subsystem; - Control group (cgroup); - Tracing infrastructure; - Workqueue subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - Packet sockets; - RDS protocol; - Network traffic control; - SCTP protocol; - SMC sockets; - Wireless networking; - SELinux security module; - ALSA framework; - SOF drivers; (CVE-2024-56653, CVE-2024-57932, CVE-2024-54455, CVE-2024-57938, CVE-2024-57896, CVE-2024-53179, CVE-2024-57903, CVE-2025-21640, CVE-2024-56654, CVE-2024-57906, CVE-2024-53690, CVE-2025-21648, CVE-2024-57913, CVE-2025-21655, CVE-2024-57907, CVE-2025-21634, CVE-2024-57926, CVE-2025-21659, CVE-2024-54460, CVE-2024-57898, CVE-2024-56769, CVE-2024-36476, CVE-2025-21938, CVE-2025-21637, CVE-2024-57888, CVE-2024-57901, CVE-2024-57887, CVE-2024-57940, CVE-2024-49571, CVE-2024-57889, CVE-2024-55639, CVE-2024-57899, CVE-2024-56759, CVE-2024-41013, CVE-2024-57895, CVE-2024-57933, CVE-2024-56662, CVE-2024-56767, CVE-2025-21639, CVE-2024-56715, CVE-2024-57883, CVE-2025-21636, CVE-2024-57931, CVE-2025-21642, CVE-2024-53685, CVE-2024-56659, CVE-2025-21971, CVE-2024-56716, CVE-2025-21652, CVE-2024-57792, CVE-2025-21638, CVE-2024-56764, CVE-2024-55916, CVE-2024-57916, CVE-2024-56718, CVE-2024-57929, CVE-2024-57900, CVE-2025-21660, CVE-2024-57879, CVE-2024-56758, CVE-2024-57908, CVE-2025-21664, CVE-2024-56652, CVE-2024-57882, CVE-2024-39282, CVE-2025-21663, CVE-2024-47736, CVE-2024-54193, CVE-2025-21650, CVE-2024-56665, CVE-2024-57793, CVE-2024-58087, CVE-2025-21658, CVE-2025-21643, CVE-2024-54683, CVE-2024-56667, CVE-2024-56664, CVE-2024-56770, CVE-2024-57946, CVE-2024-57904, CVE-2024-56709, CVE-2024-56369, CVE-2024-58237, CVE-2024-57885, CVE-2024-56763, CVE-2024-56657, CVE-2025-21645, CVE-2024-57893, CVE-2025-21631, CVE-2024-57791, CVE-2024-57910, CVE-2024-57902, CVE-2024-57806, CVE-2025-21656, CVE-2024-53125, CVE-2024-56761, CVE-2024-56717, CVE-2024-47408, CVE-2025-21654, CVE-2025-21649, CVE-2024-57807, CVE-2024-56675, CVE-2025-21653, CVE-2024-57897, CVE-2024-53687, CVE-2024-56760, CVE-2025-21635, CVE-2025-21632, CVE-2024-57890, CVE-2025-21647, CVE-2024-57917, CVE-2024-56372, CVE-2024-56656, CVE-2024-57912, CVE-2024-57841, CVE-2025-21953, CVE-2024-56710, CVE-2024-57884, CVE-2024-57804, CVE-2025-21888, CVE-2024-56660, CVE-2024-57805, CVE-2024-57801, CVE-2024-38608, CVE-2024-57945, CVE-2024-55881, CVE-2024-57802, CVE-2024-57892, CVE-2025-21646, CVE-2024-56670, CVE-2025-21651, CVE-2024-57939, CVE-2024-57925, CVE-2024-57911, CVE-2025-21662, CVE-2024-49568) Update Instructions: Run `sudo pro fix USN-7522-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-nvidia - 6.8.0-1016.17 linux-azure-nvidia-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-azure-nvidia-cloud-tools-common - 6.8.0-1016.17 linux-azure-nvidia-headers-6.8.0-1016 - 6.8.0-1016.17 linux-azure-nvidia-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-cloud-tools-azure-nvidia - 6.8.0-1016.17 linux-headers-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-headers-azure-nvidia - 6.8.0-1016.17 linux-image-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-image-azure-nvidia - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-modules-extra-azure-nvidia - 6.8.0-1016.17 linux-tools-6.8.0-1016-azure-nvidia - 6.8.0-1016.17 linux-tools-azure-nvidia - 6.8.0-1016.17 No subscription required High CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-47408 CVE-2024-47736 CVE-2024-49568 CVE-2024-49571 CVE-2024-53125 CVE-2024-53179 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56664 CVE-2024-56665 CVE-2024-56667 CVE-2024-56670 CVE-2024-56675 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57805 CVE-2024-57806 CVE-2024-57807 CVE-2024-57841 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21888 CVE-2025-21938 CVE-2025-21953 CVE-2025-21971 USN-7523-1 -- Linux kernel (Raspberry Pi Real-time) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Ublk userspace block driver; - Virtio block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - DMA engine subsystem; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - Microchip PCI driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - TDX Guest driver; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - VLANs driver; - Kernel Samepage Merging mechanism; - Memory management; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - LAPB network protocol; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Timer subsystem; - Workqueue subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - Packet sockets; - RDS protocol; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - SELinux security module; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-56566, CVE-2024-56631, CVE-2025-21756, CVE-2024-57841, CVE-2024-50270, CVE-2024-50104, CVE-2024-50143, CVE-2024-56756, CVE-2024-50295, CVE-2024-48873, CVE-2024-53229, CVE-2024-50051, CVE-2024-50125, CVE-2024-56761, CVE-2024-50223, CVE-2024-53687, CVE-2024-53094, CVE-2024-53131, CVE-2024-57933, CVE-2024-57884, CVE-2024-57917, CVE-2024-53210, CVE-2024-50245, CVE-2024-56679, CVE-2024-50258, CVE-2024-57902, CVE-2024-50236, CVE-2024-56607, CVE-2024-50209, CVE-2024-50184, CVE-2024-50127, CVE-2024-50010, CVE-2024-50185, CVE-2024-57900, CVE-2024-56739, CVE-2024-56643, CVE-2024-56675, CVE-2024-56689, CVE-2024-50135, CVE-2024-56688, CVE-2024-50153, CVE-2025-21635, CVE-2025-21632, CVE-2024-50072, CVE-2025-21646, CVE-2024-56727, CVE-2024-53058, CVE-2024-53107, CVE-2024-53166, CVE-2024-50019, CVE-2024-50242, CVE-2024-56755, CVE-2024-50301, CVE-2024-57801, CVE-2024-56716, CVE-2024-50023, CVE-2024-50288, CVE-2024-50078, CVE-2024-56572, CVE-2024-53158, CVE-2024-50075, CVE-2024-57912, CVE-2024-56759, CVE-2024-53155, CVE-2024-56584, CVE-2024-56672, CVE-2024-56590, CVE-2024-56658, CVE-2024-50235, CVE-2024-53160, CVE-2024-56622, CVE-2024-50130, CVE-2024-50265, CVE-2024-56579, CVE-2024-50292, CVE-2024-56728, CVE-2024-56543, CVE-2024-56722, CVE-2024-53197, CVE-2025-21645, CVE-2024-50138, CVE-2024-45828, CVE-2024-50208, CVE-2024-56724, CVE-2024-50304, CVE-2024-50195, CVE-2024-49571, CVE-2024-50263, CVE-2024-55881, CVE-2024-50220, CVE-2024-50044, CVE-2024-53237, CVE-2024-50278, CVE-2024-56557, CVE-2024-50068, CVE-2024-56574, CVE-2024-50180, CVE-2024-50065, CVE-2025-21642, CVE-2024-56565, CVE-2024-50189, CVE-2024-53228, CVE-2024-56752, CVE-2024-50169, CVE-2024-53198, CVE-2024-56532, CVE-2025-21659, CVE-2024-53223, CVE-2024-50084, CVE-2024-56582, CVE-2024-56632, CVE-2024-56709, CVE-2024-50134, CVE-2024-57945, CVE-2024-56546, CVE-2024-50056, CVE-2024-53059, CVE-2024-53171, CVE-2024-50080, CVE-2024-49899, CVE-2024-50090, CVE-2024-53184, CVE-2024-50131, CVE-2024-57926, CVE-2024-50225, CVE-2024-47809, CVE-2024-53180, CVE-2024-56372, CVE-2024-50137, CVE-2024-50192, CVE-2024-56642, CVE-2025-21637, CVE-2024-53219, CVE-2024-56650, CVE-2024-53090, CVE-2024-53148, CVE-2024-56785, CVE-2024-50230, CVE-2024-50275, CVE-2024-47141, CVE-2024-50022, CVE-2024-53142, CVE-2024-50059, CVE-2024-56765, CVE-2024-53046, CVE-2024-58087, CVE-2025-21664, CVE-2025-21658, CVE-2024-56569, CVE-2024-50110, CVE-2024-53161, CVE-2024-53150, CVE-2024-53140, CVE-2024-50069, CVE-2024-56594, CVE-2024-53181, CVE-2024-53178, CVE-2024-56652, CVE-2024-56708, CVE-2024-53174, CVE-2024-53072, CVE-2024-50290, CVE-2024-53162, CVE-2024-50029, CVE-2024-53179, CVE-2024-53079, CVE-2024-57906, CVE-2024-50035, CVE-2024-50224, CVE-2025-21649, CVE-2024-50163, CVE-2024-57882, CVE-2024-50024, CVE-2024-56550, CVE-2024-53690, CVE-2024-50203, CVE-2024-53195, CVE-2024-50118, CVE-2024-53175, CVE-2024-57908, CVE-2025-21701, CVE-2024-47736, CVE-2024-53067, CVE-2024-53200, CVE-2024-50032, CVE-2024-50282, CVE-2024-50162, CVE-2024-53118, CVE-2024-56636, CVE-2024-56629, CVE-2024-50030, CVE-2024-56595, CVE-2024-56601, CVE-2024-57904, CVE-2024-53115, CVE-2024-50077, CVE-2024-56654, CVE-2024-50199, CVE-2024-56782, CVE-2024-50151, CVE-2024-50182, CVE-2024-53052, CVE-2024-53151, CVE-2024-57938, CVE-2024-53084, CVE-2024-50296, CVE-2024-53217, CVE-2024-57892, CVE-2024-50287, CVE-2024-53110, CVE-2024-56763, CVE-2024-50027, CVE-2024-50261, CVE-2024-50112, CVE-2024-56533, CVE-2024-56704, CVE-2024-47726, CVE-2024-50238, CVE-2024-57876, CVE-2024-50207, CVE-2024-50116, CVE-2024-50155, CVE-2024-53086, CVE-2024-50291, CVE-2025-21631, CVE-2024-56538, CVE-2024-56720, CVE-2024-53123, CVE-2024-58099, CVE-2024-56597, CVE-2024-53168, CVE-2024-57879, CVE-2022-49034, CVE-2024-56549, CVE-2024-41014, CVE-2024-53091, CVE-2024-56677, CVE-2024-53156, CVE-2024-50158, CVE-2024-50251, CVE-2024-56641, CVE-2024-56718, CVE-2024-57901, CVE-2024-56606, CVE-2024-50268, CVE-2024-48875, CVE-2024-50167, CVE-2024-50028, CVE-2024-50256, CVE-2024-50283, CVE-2024-53133, CVE-2024-50302, CVE-2024-56721, CVE-2024-53177, CVE-2024-57798, CVE-2024-53126, CVE-2024-56638, CVE-2024-50285, CVE-2024-53076, CVE-2024-53146, CVE-2024-56698, CVE-2025-21700, CVE-2024-56619, CVE-2024-50115, CVE-2024-53190, CVE-2024-54460, CVE-2024-50073, CVE-2024-56771, CVE-2024-56637, CVE-2024-50061, CVE-2024-55639, CVE-2024-56651, CVE-2024-50064, CVE-2024-53044, CVE-2024-53096, CVE-2024-56613, CVE-2024-56769, CVE-2024-57910, CVE-2024-41013, CVE-2024-50186, CVE-2024-50159, CVE-2024-56600, CVE-2024-56787, CVE-2024-57929, CVE-2024-56640, CVE-2025-21662, CVE-2024-53099, CVE-2024-56570, CVE-2024-53100, CVE-2024-50101, CVE-2024-50160, CVE-2024-50273, CVE-2024-47711, CVE-2024-50191, CVE-2024-56786, CVE-2024-50107, CVE-2024-53236, CVE-2024-56548, CVE-2024-56562, CVE-2024-50229, CVE-2024-56647, CVE-2024-53139, CVE-2024-48876, CVE-2024-57872, CVE-2024-53063, CVE-2024-53226, CVE-2024-56758, CVE-2024-50086, CVE-2024-53209, CVE-2024-50096, CVE-2024-56660, CVE-2024-57893, CVE-2024-53083, CVE-2024-57916, CVE-2024-50205, CVE-2024-50200, CVE-2024-53108, CVE-2024-50033, CVE-2024-50276, CVE-2024-56621, CVE-2024-56725, CVE-2024-56558, CVE-2024-57931, CVE-2024-50145, CVE-2024-56616, CVE-2024-53685, CVE-2024-53129, CVE-2025-21650, CVE-2025-21654, CVE-2024-50171, CVE-2024-56599, CVE-2024-50046, CVE-2024-56701, CVE-2024-47408, CVE-2025-21636, CVE-2024-50231, CVE-2024-50152, CVE-2024-50206, CVE-2024-50009, CVE-2024-53130, CVE-2024-57793, CVE-2024-57791, CVE-2024-50262, CVE-2024-56586, CVE-2024-57895, CVE-2024-57899, CVE-2024-56608, CVE-2024-50197, CVE-2024-56774, CVE-2024-53224, CVE-2024-53231, CVE-2024-50237, CVE-2024-50139, CVE-2024-50222, CVE-2024-50039, CVE-2024-53101, CVE-2024-56776, CVE-2024-56625, CVE-2024-53188, CVE-2024-50269, CVE-2024-50055, CVE-2024-50216, CVE-2024-56615, CVE-2024-56648, CVE-2024-50048, CVE-2024-57925, CVE-2024-50193, CVE-2024-56754, CVE-2025-21647, CVE-2024-50105, CVE-2024-49893, CVE-2024-53128, CVE-2024-49568, CVE-2024-56539, CVE-2024-50117, CVE-2024-53081, CVE-2024-50148, CVE-2024-56685, CVE-2024-50226, CVE-2024-56576, CVE-2024-56627, CVE-2024-50289, CVE-2025-21653, CVE-2024-53082, CVE-2024-56581, CVE-2024-53227, CVE-2024-56691, CVE-2024-56780, CVE-2024-50095, CVE-2024-50136, CVE-2024-50201, CVE-2024-55916, CVE-2024-56583, CVE-2024-53135, CVE-2024-53106, CVE-2024-57887, CVE-2024-57792, CVE-2024-48881, CVE-2024-56645, CVE-2024-53157, CVE-2024-53045, CVE-2024-53170, CVE-2024-50082, CVE-2024-56531, CVE-2024-53183, CVE-2024-53191, CVE-2024-53163, CVE-2025-21656, CVE-2024-50274, CVE-2025-21639, CVE-2025-21663, CVE-2024-50183, CVE-2024-50020, CVE-2024-56568, CVE-2024-56781, CVE-2024-50057, CVE-2024-56681, CVE-2024-50299, CVE-2024-53233, CVE-2024-53121, CVE-2024-53214, CVE-2024-56700, CVE-2024-50247, CVE-2024-56778, CVE-2024-50067, CVE-2024-56662, CVE-2024-56635, CVE-2024-53112, CVE-2024-56729, CVE-2024-56589, CVE-2024-53093, CVE-2024-50248, CVE-2024-53220, CVE-2025-21971, CVE-2024-52332, CVE-2024-38608, CVE-2024-50062, CVE-2024-53218, CVE-2024-56630, CVE-2024-49569, CVE-2024-56745, CVE-2024-56715, CVE-2024-56633, CVE-2024-53208, CVE-2024-56770, CVE-2024-50154, CVE-2024-56705, CVE-2024-50120, CVE-2024-57939, CVE-2024-57843, CVE-2024-56609, CVE-2024-56772, CVE-2024-50211, CVE-2024-57804, CVE-2024-57889, CVE-2024-56603, CVE-2024-53087, CVE-2024-53125, CVE-2024-53061, CVE-2025-21652, CVE-2024-50255, CVE-2024-56690, CVE-2025-21702, CVE-2024-53169, CVE-2024-50240, CVE-2024-56683, CVE-2024-49972, CVE-2025-21655, CVE-2024-57874, CVE-2024-53120, CVE-2024-57907, CVE-2024-56626, CVE-2024-56726, CVE-2024-56773, CVE-2024-49914, CVE-2024-42122, CVE-2024-53194, CVE-2024-49920, CVE-2024-56545, CVE-2024-56575, CVE-2024-56775, CVE-2024-53134, CVE-2024-56717, CVE-2024-53105, CVE-2024-57897, CVE-2024-50124, CVE-2024-50239, CVE-2024-50036, CVE-2024-50234, CVE-2025-21651, CVE-2024-56767, CVE-2024-53165, CVE-2024-53680, CVE-2024-41935, CVE-2024-50150, CVE-2024-53043, CVE-2024-56659, CVE-2024-50243, CVE-2024-56567, CVE-2024-50141, CVE-2024-50049, CVE-2024-53222, CVE-2024-53122, CVE-2024-50257, CVE-2024-50147, CVE-2024-53176, CVE-2024-53234, CVE-2024-53187, CVE-2024-50280, CVE-2024-50140, CVE-2024-57911, CVE-2024-50060, CVE-2024-56598, CVE-2024-50246, CVE-2024-53047, CVE-2024-56577, CVE-2024-57802, CVE-2024-53050, CVE-2024-50088, CVE-2024-56751, CVE-2024-56611, CVE-2024-53068, CVE-2025-21643, CVE-2024-50038, CVE-2024-36476, CVE-2024-56707, CVE-2024-50040, CVE-2024-53088, CVE-2024-50284, CVE-2024-53127, CVE-2024-50298, CVE-2024-56593, CVE-2024-57898, CVE-2024-57903, CVE-2024-56703, CVE-2024-56746, CVE-2024-56663, CVE-2024-53138, CVE-2024-56744, CVE-2024-50042, CVE-2024-57940, CVE-2024-56747, CVE-2024-56623, CVE-2024-56777, CVE-2024-41932, CVE-2024-47143, CVE-2024-50098, CVE-2024-53147, CVE-2024-53173, CVE-2024-50249, CVE-2024-49921, CVE-2024-56783, CVE-2024-50294, CVE-2024-53062, CVE-2024-57946, CVE-2024-56710, CVE-2025-21640, CVE-2024-53042, CVE-2024-56649, CVE-2024-50233, CVE-2024-50121, CVE-2024-53051, CVE-2024-57932, CVE-2025-21634, CVE-2024-56580, CVE-2024-56687, CVE-2024-53239, CVE-2024-56634, CVE-2024-56653, CVE-2024-53196, CVE-2024-56596, CVE-2024-50133, CVE-2024-50142, CVE-2024-50045, CVE-2024-53119, CVE-2024-56694, CVE-2024-50188, CVE-2024-50218, CVE-2024-50259, CVE-2024-56605, CVE-2024-53232, CVE-2024-57885, CVE-2024-50198, CVE-2024-56764, CVE-2025-21648, CVE-2024-50108, CVE-2024-56644, CVE-2024-50156, CVE-2024-53215, CVE-2024-50221, CVE-2024-56678, CVE-2024-50103, CVE-2024-53230, CVE-2024-50047, CVE-2024-50202, CVE-2024-56588, CVE-2024-53117, CVE-2024-53048, CVE-2025-21660, CVE-2024-53154, CVE-2024-50187, CVE-2024-50066, CVE-2024-50170, CVE-2024-56667, CVE-2024-56540, CVE-2024-53113, CVE-2024-44955, CVE-2024-53172, CVE-2024-49865, CVE-2024-56604, CVE-2025-21638, CVE-2024-50093, CVE-2024-50128, CVE-2024-50279, CVE-2024-50286, CVE-2024-50083, CVE-2024-56657, CVE-2024-53085, CVE-2024-50303, CVE-2024-57838, CVE-2024-56551, CVE-2024-54193, CVE-2024-57888, CVE-2024-50070, CVE-2024-50172, CVE-2024-57890, CVE-2024-56578, CVE-2025-21938, CVE-2024-53066, CVE-2024-54683, CVE-2024-50196, CVE-2024-49968, CVE-2024-56692, CVE-2024-50074, CVE-2024-53053, CVE-2024-50031, CVE-2024-54455, CVE-2024-57807, CVE-2024-56742, CVE-2024-57883, CVE-2024-50099, CVE-2024-50025, CVE-2024-57850, CVE-2024-57896, CVE-2024-56587, CVE-2024-50087, CVE-2024-57806, CVE-2024-53203, CVE-2024-50272, CVE-2024-50300, CVE-2024-50058, CVE-2024-50232, CVE-2024-50111, CVE-2024-50063, CVE-2024-50297, CVE-2024-50252, CVE-2024-53221, CVE-2024-50250, CVE-2024-50146, CVE-2024-53114, CVE-2024-50215, CVE-2024-50244, CVE-2024-56369, CVE-2024-53055, CVE-2024-49906, CVE-2024-43098, CVE-2024-58237, CVE-2024-57913, CVE-2024-50085, CVE-2024-53109, CVE-2024-56693, CVE-2025-21993, CVE-2024-53213, CVE-2024-50026, CVE-2024-53095, CVE-2024-56664, CVE-2024-53111, CVE-2024-50041, CVE-2024-50021, CVE-2024-39282, CVE-2024-56592, CVE-2024-56748, CVE-2024-47794, CVE-2024-50271, CVE-2024-56614, CVE-2024-50166, CVE-2024-57849, CVE-2024-56573, CVE-2024-56620, CVE-2024-50194, CVE-2024-56723, CVE-2024-50267, CVE-2024-56779, CVE-2024-56656, CVE-2024-50164, CVE-2024-50076, CVE-2024-50126, CVE-2025-21831, CVE-2024-56610, CVE-2024-56670, CVE-2024-53145, CVE-2024-56760, CVE-2024-56602, CVE-2024-53202) Update Instructions: Run `sudo pro fix USN-7523-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-headers-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-headers-raspi-realtime - 6.8.0-2023.24 linux-image-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-image-raspi-realtime - 6.8.0-2023.24 linux-modules-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-raspi-realtime - 6.8.0-2023.24 linux-raspi-realtime-headers-6.8.0-2023 - 6.8.0-2023.24 linux-raspi-realtime-tools-6.8.0-2023 - 6.8.0-2023.24 linux-tools-6.8.0-2023-raspi-realtime - 6.8.0-2023.24 linux-tools-raspi-realtime - 6.8.0-2023.24 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2022-49034 CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-41014 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47408 CVE-2024-47711 CVE-2024-47726 CVE-2024-47736 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49568 CVE-2024-49569 CVE-2024-49571 CVE-2024-49865 CVE-2024-49893 CVE-2024-49899 CVE-2024-49906 CVE-2024-49914 CVE-2024-49920 CVE-2024-49921 CVE-2024-49968 CVE-2024-49972 CVE-2024-50009 CVE-2024-50010 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50032 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50051 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50067 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50117 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50134 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50148 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50169 CVE-2024-50170 CVE-2024-50171 CVE-2024-50172 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50229 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50302 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53061 CVE-2024-53062 CVE-2024-53063 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53125 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53140 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53165 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53179 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56658 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56667 CVE-2024-56670 CVE-2024-56672 CVE-2024-56675 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56765 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57798 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57806 CVE-2024-57807 CVE-2024-57838 CVE-2024-57841 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58099 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21938 CVE-2025-21971 CVE-2025-21993 USN-7524-1 -- Linux kernel (Raspberry Pi) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Ublk userspace block driver; - Virtio block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - DMA engine subsystem; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - iSCSI Boot Firmware Table Attributes driver; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - Hardware monitoring drivers; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - Microchip PCI driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Power supply drivers; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - TDX Guest driver; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - VLANs driver; - Kernel Samepage Merging mechanism; - Memory management; - Network file system (NFS) superblock; - Kernel stack handling interfaces; - StackDepot library; - Task handling mechanism; - userfaultfd() syscall; - Bluetooth subsystem; - IP tunnels definitions; - LAPB network protocol; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Control group (cgroup); - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Timer subsystem; - Workqueue subsystem; - Vector I/O iterator library; - KUnit library; - Maple Tree data structure library; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - Packet sockets; - RDS protocol; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - SELinux security module; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2025-21651, CVE-2024-55881, CVE-2024-50223, CVE-2024-50033, CVE-2024-57907, CVE-2024-53233, CVE-2024-57798, CVE-2024-50262, CVE-2024-50265, CVE-2024-50197, CVE-2024-50066, CVE-2024-50271, CVE-2024-57892, CVE-2024-56767, CVE-2024-50237, CVE-2024-56638, CVE-2024-50084, CVE-2025-21638, CVE-2024-56630, CVE-2024-50193, CVE-2024-50093, CVE-2024-49914, CVE-2024-50221, CVE-2024-50202, CVE-2025-21659, CVE-2024-50009, CVE-2024-53059, CVE-2024-50206, CVE-2024-53239, CVE-2024-53219, CVE-2024-53139, CVE-2024-56752, CVE-2024-50125, CVE-2024-53226, CVE-2024-57940, CVE-2024-57925, CVE-2024-53081, CVE-2024-53053, CVE-2024-56627, CVE-2024-57882, CVE-2025-21645, CVE-2025-21642, CVE-2024-50120, CVE-2024-50240, CVE-2024-53168, CVE-2024-53178, CVE-2024-53166, CVE-2024-50030, CVE-2024-50299, CVE-2024-57926, CVE-2024-55916, CVE-2024-56593, CVE-2024-53083, CVE-2024-56641, CVE-2024-50049, CVE-2024-56761, CVE-2024-56664, CVE-2024-50242, CVE-2024-56589, CVE-2024-50248, CVE-2024-41013, CVE-2024-50291, CVE-2024-53061, CVE-2024-50105, CVE-2024-53171, CVE-2024-56568, CVE-2024-50133, CVE-2024-56594, CVE-2024-56582, CVE-2024-53100, CVE-2024-50021, CVE-2024-56603, CVE-2024-50055, CVE-2024-56637, CVE-2024-50273, CVE-2025-21660, CVE-2024-50083, CVE-2024-53063, CVE-2024-56599, CVE-2024-56783, CVE-2025-21993, CVE-2024-50019, CVE-2024-53177, CVE-2024-50038, CVE-2024-53113, CVE-2024-50215, CVE-2024-50036, CVE-2024-44955, CVE-2024-56602, CVE-2024-54193, CVE-2024-56685, CVE-2024-50137, CVE-2025-21640, CVE-2024-57838, CVE-2024-50024, CVE-2024-57849, CVE-2024-50304, CVE-2024-50263, CVE-2024-50048, CVE-2024-53176, CVE-2024-50191, CVE-2024-56781, CVE-2024-56548, CVE-2024-50278, CVE-2024-57906, CVE-2024-53114, CVE-2025-21646, CVE-2024-53196, CVE-2024-50135, CVE-2024-50286, CVE-2025-21831, CVE-2024-50163, CVE-2024-56694, CVE-2024-50023, CVE-2024-50031, CVE-2024-56709, CVE-2024-50107, CVE-2024-56672, CVE-2024-57887, CVE-2024-50162, CVE-2024-50207, CVE-2024-53155, CVE-2024-50095, CVE-2024-56703, CVE-2024-50268, CVE-2024-56607, CVE-2024-53115, CVE-2024-56739, CVE-2024-53091, CVE-2024-50086, CVE-2024-56580, CVE-2024-56572, CVE-2024-56693, CVE-2024-57904, CVE-2025-21938, CVE-2024-56698, CVE-2024-50039, CVE-2024-50233, CVE-2024-50282, CVE-2024-50251, CVE-2024-53184, CVE-2025-21700, CVE-2024-56565, CVE-2024-53117, CVE-2024-50288, CVE-2024-50171, CVE-2024-56583, CVE-2024-50115, CVE-2024-53687, CVE-2024-49568, CVE-2024-53047, CVE-2024-53150, CVE-2024-56549, CVE-2024-50148, CVE-2024-56679, CVE-2024-57888, CVE-2024-53680, CVE-2024-50155, CVE-2024-56751, CVE-2024-56610, CVE-2024-50272, CVE-2024-50182, CVE-2024-57916, CVE-2024-53237, CVE-2024-50211, CVE-2024-56605, CVE-2024-56601, CVE-2024-48873, CVE-2024-50166, CVE-2024-50085, CVE-2024-50108, CVE-2024-57792, CVE-2024-50224, CVE-2024-56779, CVE-2024-50068, CVE-2024-53151, CVE-2024-56657, CVE-2024-50026, CVE-2024-53138, CVE-2024-57896, CVE-2024-53222, CVE-2024-50164, CVE-2024-53230, CVE-2024-56614, CVE-2024-53089, CVE-2024-57895, CVE-2024-56755, CVE-2024-50096, CVE-2024-56645, CVE-2024-53162, CVE-2024-56566, CVE-2024-53086, CVE-2024-56718, CVE-2024-50062, CVE-2024-50065, CVE-2024-56763, CVE-2024-56538, CVE-2024-53127, CVE-2024-49893, CVE-2024-53087, CVE-2024-53058, CVE-2024-57945, CVE-2024-53174, CVE-2024-53096, CVE-2024-56546, CVE-2024-56754, CVE-2024-49865, CVE-2024-56635, CVE-2024-56539, CVE-2024-56551, CVE-2024-53044, CVE-2024-56700, CVE-2024-56787, CVE-2024-56586, CVE-2024-56687, CVE-2024-53236, CVE-2024-50058, CVE-2024-53146, CVE-2024-50269, CVE-2024-50056, CVE-2024-56608, CVE-2024-49899, CVE-2024-53099, CVE-2024-57902, CVE-2024-56656, CVE-2024-50126, CVE-2024-50274, CVE-2025-21654, CVE-2025-21971, CVE-2024-53130, CVE-2024-49571, CVE-2024-56742, CVE-2024-56613, CVE-2024-56575, CVE-2024-56540, CVE-2024-53194, CVE-2024-50044, CVE-2024-49906, CVE-2024-53163, CVE-2024-56774, CVE-2024-50143, CVE-2024-49968, CVE-2024-53202, CVE-2024-57876, CVE-2024-56650, CVE-2024-53685, CVE-2025-21656, CVE-2024-56648, CVE-2025-21636, CVE-2024-56782, CVE-2024-50198, CVE-2024-50110, CVE-2024-56775, CVE-2024-50239, CVE-2024-53156, CVE-2024-50045, CVE-2024-53045, CVE-2024-58237, CVE-2024-50167, CVE-2024-50060, CVE-2024-56372, CVE-2024-56756, CVE-2024-54455, CVE-2024-56543, CVE-2024-56772, CVE-2024-50131, CVE-2024-56616, CVE-2024-50185, CVE-2024-53154, CVE-2024-50138, CVE-2024-53111, CVE-2024-50025, CVE-2024-50156, CVE-2024-39282, CVE-2024-53140, CVE-2024-57872, CVE-2024-50077, CVE-2025-21652, CVE-2025-21655, CVE-2024-57901, CVE-2024-57791, CVE-2024-50259, CVE-2024-57890, CVE-2024-56770, CVE-2024-53170, CVE-2024-56705, CVE-2024-56597, CVE-2024-50047, CVE-2024-53101, CVE-2024-50128, CVE-2024-50287, CVE-2024-50186, CVE-2024-56745, CVE-2024-56720, CVE-2024-57889, CVE-2024-56590, CVE-2024-57807, CVE-2024-50158, CVE-2024-53198, CVE-2024-57843, CVE-2024-53095, CVE-2024-56678, CVE-2024-56758, CVE-2024-53120, CVE-2024-50087, CVE-2024-50147, CVE-2024-56652, CVE-2024-56692, CVE-2024-56724, CVE-2024-50226, CVE-2024-56609, CVE-2024-56769, CVE-2024-47408, CVE-2024-53187, CVE-2024-56596, CVE-2024-48875, CVE-2024-50236, CVE-2024-50284, CVE-2024-49921, CVE-2024-53229, CVE-2024-50256, CVE-2024-57946, CVE-2024-53175, CVE-2024-56619, CVE-2024-50257, CVE-2024-53210, CVE-2024-53203, CVE-2025-21658, CVE-2024-56683, CVE-2024-50302, CVE-2024-56570, CVE-2024-50187, CVE-2025-21650, CVE-2024-50082, CVE-2024-50194, CVE-2024-53072, CVE-2024-50118, CVE-2024-53043, CVE-2024-50160, CVE-2025-21635, CVE-2024-57900, CVE-2024-57879, CVE-2024-50294, CVE-2024-48876, CVE-2024-50250, CVE-2024-50220, CVE-2025-21648, CVE-2024-50032, CVE-2024-56765, CVE-2024-56369, CVE-2024-53109, CVE-2024-47143, CVE-2025-21643, CVE-2024-50261, CVE-2024-56558, CVE-2024-49920, CVE-2024-56689, CVE-2024-56647, CVE-2024-50290, CVE-2024-57908, CVE-2024-53209, CVE-2024-53220, CVE-2024-50073, CVE-2024-47711, CVE-2024-50183, CVE-2024-56690, CVE-2024-50067, CVE-2024-56778, CVE-2024-56622, CVE-2024-56729, CVE-2024-53157, CVE-2024-53213, CVE-2024-50130, CVE-2024-56629, CVE-2024-57885, CVE-2025-21637, CVE-2024-50078, CVE-2024-53224, CVE-2024-50116, CVE-2024-53068, CVE-2024-50300, CVE-2024-53084, CVE-2024-50099, CVE-2024-56723, CVE-2024-50230, CVE-2024-56636, CVE-2024-50252, CVE-2024-56587, CVE-2024-53131, CVE-2024-50046, CVE-2024-50200, CVE-2024-56588, CVE-2024-47726, CVE-2024-56615, CVE-2024-57917, CVE-2024-50063, CVE-2024-50246, CVE-2024-53055, CVE-2024-53133, CVE-2024-50205, CVE-2024-53076, CVE-2024-50283, CVE-2024-56660, CVE-2024-56707, CVE-2024-50180, CVE-2024-56746, CVE-2025-21756, CVE-2024-50127, CVE-2024-50145, CVE-2024-56625, CVE-2024-56760, CVE-2024-53121, CVE-2024-53122, CVE-2024-53062, CVE-2024-53046, CVE-2024-56764, CVE-2024-57801, CVE-2024-56728, CVE-2022-49034, CVE-2024-53094, CVE-2024-53147, CVE-2024-56776, CVE-2024-57898, CVE-2024-53148, CVE-2024-56704, CVE-2024-50035, CVE-2024-50152, CVE-2024-50169, CVE-2024-56600, CVE-2024-56681, CVE-2024-45828, CVE-2024-53052, CVE-2024-56574, CVE-2024-56531, CVE-2024-50303, CVE-2024-57897, CVE-2024-53123, CVE-2024-57874, CVE-2024-57939, CVE-2024-47141, CVE-2024-56659, CVE-2024-50069, CVE-2024-50141, CVE-2024-50201, CVE-2024-50270, CVE-2024-56621, CVE-2024-56606, CVE-2024-53129, CVE-2024-57938, CVE-2024-50203, CVE-2024-56708, CVE-2024-53197, CVE-2024-53208, CVE-2024-50028, CVE-2024-56677, CVE-2025-21664, CVE-2024-50121, CVE-2024-56644, CVE-2024-57804, CVE-2024-53145, CVE-2024-56780, CVE-2024-50112, CVE-2024-56759, CVE-2024-50192, CVE-2024-53181, CVE-2024-50170, CVE-2024-50080, CVE-2024-50238, CVE-2024-57912, CVE-2024-50222, CVE-2024-36476, CVE-2024-53107, CVE-2024-53119, CVE-2024-43098, CVE-2024-56604, CVE-2024-56567, CVE-2024-47736, CVE-2024-53180, CVE-2024-38608, CVE-2024-53227, CVE-2024-50136, CVE-2024-53105, CVE-2024-50225, CVE-2024-56649, CVE-2024-57899, CVE-2024-41014, CVE-2024-50188, CVE-2024-53160, CVE-2024-53183, CVE-2024-54460, CVE-2024-56725, CVE-2024-56642, CVE-2024-53223, CVE-2024-56631, CVE-2024-50134, CVE-2024-53135, CVE-2024-56573, CVE-2024-50104, CVE-2024-53126, CVE-2024-56667, CVE-2025-21662, CVE-2024-53221, CVE-2024-56786, CVE-2024-50040, CVE-2024-53085, CVE-2024-50051, CVE-2024-56721, CVE-2024-52332, CVE-2024-50075, CVE-2024-50208, CVE-2024-50209, CVE-2024-56710, CVE-2024-50296, CVE-2024-53066, CVE-2025-21701, CVE-2024-56584, CVE-2024-41932, CVE-2024-50059, CVE-2024-57911, CVE-2024-56785, CVE-2024-50216, CVE-2024-50249, CVE-2024-49569, CVE-2024-50098, CVE-2024-56777, CVE-2024-53093, CVE-2024-53067, CVE-2025-21634, CVE-2024-53190, CVE-2024-50199, CVE-2024-56577, CVE-2024-56653, CVE-2024-50027, CVE-2024-50285, CVE-2025-21632, CVE-2025-21702, CVE-2024-57893, CVE-2024-50235, CVE-2024-56658, CVE-2024-57802, CVE-2024-58087, CVE-2024-53112, CVE-2024-47809, CVE-2024-50111, CVE-2024-57910, CVE-2024-53142, CVE-2024-50196, CVE-2024-56578, CVE-2024-53200, CVE-2024-50276, CVE-2024-53188, CVE-2024-53048, CVE-2024-56771, CVE-2024-53228, CVE-2024-57850, CVE-2024-49972, CVE-2025-21647, CVE-2024-50072, CVE-2024-56701, CVE-2024-53232, CVE-2024-50088, CVE-2024-56557, CVE-2024-56632, CVE-2024-50142, CVE-2024-57806, CVE-2024-53051, CVE-2024-57931, CVE-2024-50103, CVE-2024-50258, CVE-2024-53172, CVE-2024-53106, CVE-2024-53158, CVE-2024-56595, CVE-2024-53108, CVE-2024-56626, CVE-2024-56691, CVE-2024-50289, CVE-2024-53217, CVE-2024-50234, CVE-2024-54683, CVE-2024-53042, CVE-2024-56675, CVE-2024-50195, CVE-2024-53195, CVE-2024-56654, CVE-2024-56715, CVE-2025-21639, CVE-2024-57913, CVE-2024-56717, CVE-2024-56651, CVE-2024-56688, CVE-2024-53128, CVE-2024-53169, CVE-2024-56620, CVE-2024-50189, CVE-2024-56550, CVE-2024-50244, CVE-2024-50279, CVE-2024-42122, CVE-2024-58099, CVE-2024-53179, CVE-2024-56532, CVE-2024-53215, CVE-2024-50232, CVE-2024-50029, CVE-2024-57933, CVE-2024-56662, CVE-2024-53690, CVE-2024-53134, CVE-2024-48881, CVE-2024-56727, CVE-2024-56576, CVE-2024-56670, CVE-2024-56598, CVE-2024-53161, CVE-2024-50061, CVE-2024-50117, CVE-2025-21653, CVE-2024-50101, CVE-2024-55639, CVE-2025-21649, CVE-2024-53231, CVE-2024-50041, CVE-2024-50231, CVE-2024-57932, CVE-2024-50076, CVE-2024-53165, CVE-2024-57793, CVE-2024-53082, CVE-2024-50020, CVE-2024-50267, CVE-2024-57883, CVE-2024-50298, CVE-2024-56643, CVE-2024-56640, CVE-2024-50074, CVE-2024-53125, CVE-2024-56748, CVE-2024-56634, CVE-2024-50064, CVE-2024-50172, CVE-2024-50255, CVE-2024-50042, CVE-2024-57929, CVE-2024-56773, CVE-2024-53214, CVE-2024-53110, CVE-2024-56569, CVE-2024-56581, CVE-2024-56716, CVE-2024-50090, CVE-2024-53218, CVE-2024-57884, CVE-2024-56611, CVE-2024-50243, CVE-2024-56545, CVE-2024-56623, CVE-2024-53173, CVE-2024-53090, CVE-2025-21631, CVE-2024-56744, CVE-2024-56722, CVE-2024-50297, CVE-2024-56726, CVE-2024-56592, CVE-2024-50275, CVE-2025-21663, CVE-2024-57841, CVE-2024-50150, CVE-2024-50301, CVE-2024-56579, CVE-2024-53088, CVE-2024-50153, CVE-2024-50280, CVE-2024-50124, CVE-2024-50229, CVE-2024-50146, CVE-2024-50057, CVE-2024-56562, CVE-2024-50070, CVE-2024-50218, CVE-2024-53118, CVE-2024-47794, CVE-2024-50295, CVE-2024-56747, CVE-2024-56663, CVE-2024-50292, CVE-2024-50140, CVE-2024-50154, CVE-2024-53050, CVE-2024-41935, CVE-2024-56533, CVE-2024-50139, CVE-2024-56633, CVE-2024-50184, CVE-2024-53191, CVE-2024-50022, CVE-2024-50010, CVE-2024-50245, CVE-2024-53079, CVE-2024-50151, CVE-2024-53234, CVE-2024-50247, CVE-2024-50159, CVE-2024-57903) Update Instructions: Run `sudo pro fix USN-7524-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-raspi - 6.8.0-1028.32 linux-headers-6.8.0-1028-raspi - 6.8.0-1028.32 linux-headers-raspi - 6.8.0-1028.32 linux-image-6.8.0-1028-raspi - 6.8.0-1028.32 linux-image-raspi - 6.8.0-1028.32 linux-modules-6.8.0-1028-raspi - 6.8.0-1028.32 linux-raspi - 6.8.0-1028.32 linux-raspi-headers-6.8.0-1028 - 6.8.0-1028.32 linux-raspi-tools-6.8.0-1028 - 6.8.0-1028.32 linux-tools-6.8.0-1028-raspi - 6.8.0-1028.32 linux-tools-raspi - 6.8.0-1028.32 No subscription required High CVE-2022-49034 CVE-2024-36476 CVE-2024-38608 CVE-2024-39282 CVE-2024-41013 CVE-2024-41014 CVE-2024-41932 CVE-2024-41935 CVE-2024-42122 CVE-2024-43098 CVE-2024-44955 CVE-2024-45828 CVE-2024-47141 CVE-2024-47143 CVE-2024-47408 CVE-2024-47711 CVE-2024-47726 CVE-2024-47736 CVE-2024-47794 CVE-2024-47809 CVE-2024-48873 CVE-2024-48875 CVE-2024-48876 CVE-2024-48881 CVE-2024-49568 CVE-2024-49569 CVE-2024-49571 CVE-2024-49865 CVE-2024-49893 CVE-2024-49899 CVE-2024-49906 CVE-2024-49914 CVE-2024-49920 CVE-2024-49921 CVE-2024-49968 CVE-2024-49972 CVE-2024-50009 CVE-2024-50010 CVE-2024-50019 CVE-2024-50020 CVE-2024-50021 CVE-2024-50022 CVE-2024-50023 CVE-2024-50024 CVE-2024-50025 CVE-2024-50026 CVE-2024-50027 CVE-2024-50028 CVE-2024-50029 CVE-2024-50030 CVE-2024-50031 CVE-2024-50032 CVE-2024-50033 CVE-2024-50035 CVE-2024-50036 CVE-2024-50038 CVE-2024-50039 CVE-2024-50040 CVE-2024-50041 CVE-2024-50042 CVE-2024-50044 CVE-2024-50045 CVE-2024-50046 CVE-2024-50047 CVE-2024-50048 CVE-2024-50049 CVE-2024-50051 CVE-2024-50055 CVE-2024-50056 CVE-2024-50057 CVE-2024-50058 CVE-2024-50059 CVE-2024-50060 CVE-2024-50061 CVE-2024-50062 CVE-2024-50063 CVE-2024-50064 CVE-2024-50065 CVE-2024-50066 CVE-2024-50067 CVE-2024-50068 CVE-2024-50069 CVE-2024-50070 CVE-2024-50072 CVE-2024-50073 CVE-2024-50074 CVE-2024-50075 CVE-2024-50076 CVE-2024-50077 CVE-2024-50078 CVE-2024-50080 CVE-2024-50082 CVE-2024-50083 CVE-2024-50084 CVE-2024-50085 CVE-2024-50086 CVE-2024-50087 CVE-2024-50088 CVE-2024-50090 CVE-2024-50093 CVE-2024-50095 CVE-2024-50096 CVE-2024-50098 CVE-2024-50099 CVE-2024-50101 CVE-2024-50103 CVE-2024-50104 CVE-2024-50105 CVE-2024-50107 CVE-2024-50108 CVE-2024-50110 CVE-2024-50111 CVE-2024-50112 CVE-2024-50115 CVE-2024-50116 CVE-2024-50117 CVE-2024-50118 CVE-2024-50120 CVE-2024-50121 CVE-2024-50124 CVE-2024-50125 CVE-2024-50126 CVE-2024-50127 CVE-2024-50128 CVE-2024-50130 CVE-2024-50131 CVE-2024-50133 CVE-2024-50134 CVE-2024-50135 CVE-2024-50136 CVE-2024-50137 CVE-2024-50138 CVE-2024-50139 CVE-2024-50140 CVE-2024-50141 CVE-2024-50142 CVE-2024-50143 CVE-2024-50145 CVE-2024-50146 CVE-2024-50147 CVE-2024-50148 CVE-2024-50150 CVE-2024-50151 CVE-2024-50152 CVE-2024-50153 CVE-2024-50154 CVE-2024-50155 CVE-2024-50156 CVE-2024-50158 CVE-2024-50159 CVE-2024-50160 CVE-2024-50162 CVE-2024-50163 CVE-2024-50164 CVE-2024-50166 CVE-2024-50167 CVE-2024-50169 CVE-2024-50170 CVE-2024-50171 CVE-2024-50172 CVE-2024-50180 CVE-2024-50182 CVE-2024-50183 CVE-2024-50184 CVE-2024-50185 CVE-2024-50186 CVE-2024-50187 CVE-2024-50188 CVE-2024-50189 CVE-2024-50191 CVE-2024-50192 CVE-2024-50193 CVE-2024-50194 CVE-2024-50195 CVE-2024-50196 CVE-2024-50197 CVE-2024-50198 CVE-2024-50199 CVE-2024-50200 CVE-2024-50201 CVE-2024-50202 CVE-2024-50203 CVE-2024-50205 CVE-2024-50206 CVE-2024-50207 CVE-2024-50208 CVE-2024-50209 CVE-2024-50211 CVE-2024-50215 CVE-2024-50216 CVE-2024-50218 CVE-2024-50220 CVE-2024-50221 CVE-2024-50222 CVE-2024-50223 CVE-2024-50224 CVE-2024-50225 CVE-2024-50226 CVE-2024-50229 CVE-2024-50230 CVE-2024-50231 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234 CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50238 CVE-2024-50239 CVE-2024-50240 CVE-2024-50242 CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50246 CVE-2024-50247 CVE-2024-50248 CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252 CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50258 CVE-2024-50259 CVE-2024-50261 CVE-2024-50262 CVE-2024-50263 CVE-2024-50265 CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50270 CVE-2024-50271 CVE-2024-50272 CVE-2024-50273 CVE-2024-50274 CVE-2024-50275 CVE-2024-50276 CVE-2024-50278 CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283 CVE-2024-50284 CVE-2024-50285 CVE-2024-50286 CVE-2024-50287 CVE-2024-50288 CVE-2024-50289 CVE-2024-50290 CVE-2024-50291 CVE-2024-50292 CVE-2024-50294 CVE-2024-50295 CVE-2024-50296 CVE-2024-50297 CVE-2024-50298 CVE-2024-50299 CVE-2024-50300 CVE-2024-50301 CVE-2024-50302 CVE-2024-50303 CVE-2024-50304 CVE-2024-52332 CVE-2024-53042 CVE-2024-53043 CVE-2024-53044 CVE-2024-53045 CVE-2024-53046 CVE-2024-53047 CVE-2024-53048 CVE-2024-53050 CVE-2024-53051 CVE-2024-53052 CVE-2024-53053 CVE-2024-53055 CVE-2024-53058 CVE-2024-53059 CVE-2024-53061 CVE-2024-53062 CVE-2024-53063 CVE-2024-53066 CVE-2024-53067 CVE-2024-53068 CVE-2024-53072 CVE-2024-53076 CVE-2024-53079 CVE-2024-53081 CVE-2024-53082 CVE-2024-53083 CVE-2024-53084 CVE-2024-53085 CVE-2024-53086 CVE-2024-53087 CVE-2024-53088 CVE-2024-53089 CVE-2024-53090 CVE-2024-53091 CVE-2024-53093 CVE-2024-53094 CVE-2024-53095 CVE-2024-53096 CVE-2024-53099 CVE-2024-53100 CVE-2024-53101 CVE-2024-53105 CVE-2024-53106 CVE-2024-53107 CVE-2024-53108 CVE-2024-53109 CVE-2024-53110 CVE-2024-53111 CVE-2024-53112 CVE-2024-53113 CVE-2024-53114 CVE-2024-53115 CVE-2024-53117 CVE-2024-53118 CVE-2024-53119 CVE-2024-53120 CVE-2024-53121 CVE-2024-53122 CVE-2024-53123 CVE-2024-53125 CVE-2024-53126 CVE-2024-53127 CVE-2024-53128 CVE-2024-53129 CVE-2024-53130 CVE-2024-53131 CVE-2024-53133 CVE-2024-53134 CVE-2024-53135 CVE-2024-53138 CVE-2024-53139 CVE-2024-53140 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53147 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53160 CVE-2024-53161 CVE-2024-53162 CVE-2024-53163 CVE-2024-53165 CVE-2024-53166 CVE-2024-53168 CVE-2024-53169 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53179 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53187 CVE-2024-53188 CVE-2024-53190 CVE-2024-53191 CVE-2024-53194 CVE-2024-53195 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53200 CVE-2024-53202 CVE-2024-53203 CVE-2024-53208 CVE-2024-53209 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53218 CVE-2024-53219 CVE-2024-53220 CVE-2024-53221 CVE-2024-53222 CVE-2024-53223 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227 CVE-2024-53228 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53232 CVE-2024-53233 CVE-2024-53234 CVE-2024-53236 CVE-2024-53237 CVE-2024-53239 CVE-2024-53680 CVE-2024-53685 CVE-2024-53687 CVE-2024-53690 CVE-2024-54193 CVE-2024-54455 CVE-2024-54460 CVE-2024-54683 CVE-2024-55639 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56372 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56538 CVE-2024-56539 CVE-2024-56540 CVE-2024-56543 CVE-2024-56545 CVE-2024-56546 CVE-2024-56548 CVE-2024-56549 CVE-2024-56550 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56565 CVE-2024-56566 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56573 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56577 CVE-2024-56578 CVE-2024-56579 CVE-2024-56580 CVE-2024-56581 CVE-2024-56582 CVE-2024-56583 CVE-2024-56584 CVE-2024-56586 CVE-2024-56587 CVE-2024-56588 CVE-2024-56589 CVE-2024-56590 CVE-2024-56592 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56607 CVE-2024-56608 CVE-2024-56609 CVE-2024-56610 CVE-2024-56611 CVE-2024-56613 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56620 CVE-2024-56621 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56632 CVE-2024-56633 CVE-2024-56634 CVE-2024-56635 CVE-2024-56636 CVE-2024-56637 CVE-2024-56638 CVE-2024-56640 CVE-2024-56641 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56647 CVE-2024-56648 CVE-2024-56649 CVE-2024-56650 CVE-2024-56651 CVE-2024-56652 CVE-2024-56653 CVE-2024-56654 CVE-2024-56656 CVE-2024-56657 CVE-2024-56658 CVE-2024-56659 CVE-2024-56660 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56667 CVE-2024-56670 CVE-2024-56672 CVE-2024-56675 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56685 CVE-2024-56687 CVE-2024-56688 CVE-2024-56689 CVE-2024-56690 CVE-2024-56691 CVE-2024-56692 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56709 CVE-2024-56710 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56720 CVE-2024-56721 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56729 CVE-2024-56739 CVE-2024-56742 CVE-2024-56744 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56752 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56758 CVE-2024-56759 CVE-2024-56760 CVE-2024-56761 CVE-2024-56763 CVE-2024-56764 CVE-2024-56765 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-56771 CVE-2024-56772 CVE-2024-56773 CVE-2024-56774 CVE-2024-56775 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56782 CVE-2024-56783 CVE-2024-56785 CVE-2024-56786 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793 CVE-2024-57798 CVE-2024-57801 CVE-2024-57802 CVE-2024-57804 CVE-2024-57806 CVE-2024-57807 CVE-2024-57838 CVE-2024-57841 CVE-2024-57843 CVE-2024-57849 CVE-2024-57850 CVE-2024-57872 CVE-2024-57874 CVE-2024-57876 CVE-2024-57879 CVE-2024-57882 CVE-2024-57883 CVE-2024-57884 CVE-2024-57885 CVE-2024-57887 CVE-2024-57888 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57895 CVE-2024-57896 CVE-2024-57897 CVE-2024-57898 CVE-2024-57899 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57925 CVE-2024-57926 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57933 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57945 CVE-2024-57946 CVE-2024-58087 CVE-2024-58099 CVE-2024-58237 CVE-2025-21631 CVE-2025-21632 CVE-2025-21634 CVE-2025-21635 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21642 CVE-2025-21643 CVE-2025-21645 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21649 CVE-2025-21650 CVE-2025-21651 CVE-2025-21652 CVE-2025-21653 CVE-2025-21654 CVE-2025-21655 CVE-2025-21656 CVE-2025-21658 CVE-2025-21659 CVE-2025-21660 CVE-2025-21662 CVE-2025-21663 CVE-2025-21664 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21756 CVE-2025-21831 CVE-2025-21938 CVE-2025-21971 CVE-2025-21993 USN-7525-1 -- Tomcat vulnerability Ubuntu 24.04 LTS It was discovered that Apache Tomcat incorrectly implemented partial PUT functionality by replacing path separators with dots in temporary files. A remote attacker could possibly use this issue to access sensitive files, inject malicious content, or execute remote code. Update Instructions: Run `sudo pro fix USN-7525-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat10-embed-java - 10.1.16-1ubuntu0.1~esm1 libtomcat10-java - 10.1.16-1ubuntu0.1~esm1 tomcat10 - 10.1.16-1ubuntu0.1~esm1 tomcat10-admin - 10.1.16-1ubuntu0.1~esm1 tomcat10-common - 10.1.16-1ubuntu0.1~esm1 tomcat10-docs - 10.1.16-1ubuntu0.1~esm1 tomcat10-examples - 10.1.16-1ubuntu0.1~esm1 tomcat10-user - 10.1.16-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2025-24813 USN-7525-2 -- Tomcat vulnerability Ubuntu 24.04 LTS USN-7525-1 fixed CVE-2025-24813 for tomcat9 in Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. This update fixes it for tomcat9 in Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.10. These versions include only the tomcat library (libtomcat9-java) and not the full tomcat server stack. Original advisory details: It was discovered that Apache Tomcat incorrectly implemented partial PUT functionality by replacing path separators with dots in temporary files. A remote attacker could possibly use this issue to access sensitive files, inject malicious content, or execute remote code. Update Instructions: Run `sudo pro fix USN-7525-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2025-24813 USN-7528-1 -- SQLite vulnerabilities Ubuntu 24.04 LTS It was discovered that SQLite incorrectly handled the concat_ws() function. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-29087, CVE-2025-3277) It was discovered that SQLite incorrectly handled certain argument values to sqlite3_db_config(). An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-29088) Update Instructions: Run `sudo pro fix USN-7528-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.45.1-1ubuntu2.3 libsqlite3-0 - 3.45.1-1ubuntu2.3 libsqlite3-dev - 3.45.1-1ubuntu2.3 libsqlite3-tcl - 3.45.1-1ubuntu2.3 sqlite3 - 3.45.1-1ubuntu2.3 sqlite3-doc - 3.45.1-1ubuntu2.3 sqlite3-tools - 3.45.1-1ubuntu2.3 No subscription required Medium CVE-2025-29087 CVE-2025-29088 CVE-2025-3277 USN-7532-1 -- GLib vulnerability Ubuntu 24.04 LTS It was discovered that Glib incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7532-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.4 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.4 gir1.2-glib-2.0 - 2.80.0-6ubuntu3.4 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.4 libgirepository-2.0-0 - 2.80.0-6ubuntu3.4 libgirepository-2.0-dev - 2.80.0-6ubuntu3.4 libglib2.0-0t64 - 2.80.0-6ubuntu3.4 libglib2.0-bin - 2.80.0-6ubuntu3.4 libglib2.0-data - 2.80.0-6ubuntu3.4 libglib2.0-dev - 2.80.0-6ubuntu3.4 libglib2.0-dev-bin - 2.80.0-6ubuntu3.4 libglib2.0-doc - 2.80.0-6ubuntu3.4 libglib2.0-tests - 2.80.0-6ubuntu3.4 No subscription required Medium CVE-2025-4373 USN-7535-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS Sander Wiebing and Cristiano Giuffrida discovered that some Intel® Processors did not properly handle data in Shared Microarchitectural Structures during Transient Execution. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-28956) It was discovered that some Intel® Processors did not properly handle prediction calculations. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-43420, CVE-2024-45332, CVE-2025-20623) It was discovered that some Intel® Processors did not properly initialize resources in the branch prediction unit. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2025-20012, CVE-2025-24495) Michal Raviv and Jeff Gilbert discovered that some Intel® Processors did not properly handle resources and exceptions in the core management mechanism. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2025-20054, CVE-2025-20103) Update Instructions: Run `sudo pro fix USN-7535-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250512.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-28956 CVE-2024-43420 CVE-2024-45332 CVE-2025-20012 CVE-2025-20054 CVE-2025-20103 CVE-2025-20623 CVE-2025-24495 USN-7536-1 -- cifs-utils vulnerability Ubuntu 24.04 LTS It was discovered that cifs-utils incorrectly handled namespaces when obtaining Kerberos credentials. An attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-7536-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cifs-utils - 2:7.0-2ubuntu0.1 No subscription required Medium CVE-2025-2312 USN-7537-1 -- net-tools vulnerability Ubuntu 24.04 LTS It was discovered that net-tools incorrectly handled certain inputs. An attacker could possible use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7537-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: net-tools - 2.10-0.1ubuntu4.1 No subscription required Medium CVE-2025-46836 USN-7537-2 -- net-tools regression Ubuntu 24.04 LTS USN-7537-1 fixed a vulnerability in net-tools that caused a regression. This update fixes the problem. Original advisory details: It was discovered that net-tools incorrectly handled certain inputs. An attacker could possible use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7537-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: net-tools - 2.10-0.1ubuntu4.4 No subscription required None https://launchpad.net/bugs/2111912 USN-7538-1 -- FFmpeg vulnerabilities Ubuntu 24.04 LTS Simcha Kosman discovered that FFmpeg did not correctly handle certain return values. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-0518) It was discovered that FFmpeg did not correctly handle certain memory operations. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.10. (CVE-2025-1816) It was discovered that FFmpeg contained a reachable assertion, which could lead to a failure when processing certain AAC files. If a user or automated system were tricked into opening a specially crafted AAC file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-22919) It was discovered that FFmpeg did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 and Ubuntu 25.04. (CVE-2025-22921) It was discovered that FFmpeg did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10 and Ubuntu 25.04. (CVE-2025-25473) Update Instructions: Run `sudo pro fix USN-7538-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm3 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm3 libavcodec-dev - 7:6.1.1-3ubuntu5+esm3 libavcodec-extra - 7:6.1.1-3ubuntu5+esm3 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm3 libavcodec60 - 7:6.1.1-3ubuntu5+esm3 libavdevice-dev - 7:6.1.1-3ubuntu5+esm3 libavdevice60 - 7:6.1.1-3ubuntu5+esm3 libavfilter-dev - 7:6.1.1-3ubuntu5+esm3 libavfilter-extra - 7:6.1.1-3ubuntu5+esm3 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm3 libavfilter9 - 7:6.1.1-3ubuntu5+esm3 libavformat-dev - 7:6.1.1-3ubuntu5+esm3 libavformat-extra - 7:6.1.1-3ubuntu5+esm3 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm3 libavformat60 - 7:6.1.1-3ubuntu5+esm3 libavutil-dev - 7:6.1.1-3ubuntu5+esm3 libavutil58 - 7:6.1.1-3ubuntu5+esm3 libpostproc-dev - 7:6.1.1-3ubuntu5+esm3 libpostproc57 - 7:6.1.1-3ubuntu5+esm3 libswresample-dev - 7:6.1.1-3ubuntu5+esm3 libswresample4 - 7:6.1.1-3ubuntu5+esm3 libswscale-dev - 7:6.1.1-3ubuntu5+esm3 libswscale7 - 7:6.1.1-3ubuntu5+esm3 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2025-22919 CVE-2025-0518 CVE-2025-22921 CVE-2025-25473 CVE-2025-1816 USN-7542-1 -- Kerberos vulnerability Ubuntu 24.04 LTS It was discovered that Kerberos allowed the usage of weak cryptographic standards. An attacker could possibly use this issue to expose sensitive information. This update introduces the allow_rc4 and allow_des3 configuration options, and disables the usage of RC4 and 3DES ciphers by default. Users are advised to discontinue their usage and upgrade to stronger encryption protocols. If the use of the insecure RC4 and 3DES algorithms is necessary, they can be enabled with the aforementioned configuration options. Update Instructions: Run `sudo pro fix USN-7542-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.6 krb5-doc - 1.20.1-6ubuntu2.6 krb5-gss-samples - 1.20.1-6ubuntu2.6 krb5-k5tls - 1.20.1-6ubuntu2.6 krb5-kdc - 1.20.1-6ubuntu2.6 krb5-kdc-ldap - 1.20.1-6ubuntu2.6 krb5-kpropd - 1.20.1-6ubuntu2.6 krb5-locales - 1.20.1-6ubuntu2.6 krb5-multidev - 1.20.1-6ubuntu2.6 krb5-otp - 1.20.1-6ubuntu2.6 krb5-pkinit - 1.20.1-6ubuntu2.6 krb5-user - 1.20.1-6ubuntu2.6 libgssapi-krb5-2 - 1.20.1-6ubuntu2.6 libgssrpc4t64 - 1.20.1-6ubuntu2.6 libk5crypto3 - 1.20.1-6ubuntu2.6 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.6 libkadm5srv-mit12 - 1.20.1-6ubuntu2.6 libkdb5-10t64 - 1.20.1-6ubuntu2.6 libkrad-dev - 1.20.1-6ubuntu2.6 libkrad0 - 1.20.1-6ubuntu2.6 libkrb5-3 - 1.20.1-6ubuntu2.6 libkrb5-dev - 1.20.1-6ubuntu2.6 libkrb5support0 - 1.20.1-6ubuntu2.6 No subscription required Medium CVE-2025-3576 USN-7543-1 -- libsoup vulnerabilities Ubuntu 24.04 LTS Jan Różański discovered that libsoup incorrectly handled certain headers when sending HTTP/2 requests over TLS. An attacker could possibly use this issue to cause a denial of service. This issue only affected libsoup3 in Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-32908) Jan Różański discovered that libsoup incorrectly parsed certain response headers. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-4476) Update Instructions: Run `sudo pro fix USN-7543-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-soup-2.4 - 2.74.3-6ubuntu1.5 libsoup-2.4-1 - 2.74.3-6ubuntu1.5 libsoup-gnome-2.4-1 - 2.74.3-6ubuntu1.5 libsoup-gnome2.4-dev - 2.74.3-6ubuntu1.5 libsoup2.4-common - 2.74.3-6ubuntu1.5 libsoup2.4-dev - 2.74.3-6ubuntu1.5 libsoup2.4-doc - 2.74.3-6ubuntu1.5 libsoup2.4-tests - 2.74.3-6ubuntu1.5 No subscription required gir1.2-soup-3.0 - 3.4.4-5ubuntu0.4 libsoup-3.0-0 - 3.4.4-5ubuntu0.4 libsoup-3.0-common - 3.4.4-5ubuntu0.4 libsoup-3.0-dev - 3.4.4-5ubuntu0.4 libsoup-3.0-doc - 3.4.4-5ubuntu0.4 libsoup-3.0-tests - 3.4.4-5ubuntu0.4 No subscription required Medium CVE-2025-4476 CVE-2025-32908 USN-7544-1 -- Setuptools vulnerability Ubuntu 24.04 LTS It was discovered that setuptools did not properly sanitize paths. An attacker could possibly use this issue to write files to arbitrary locations on the filesystem. Update Instructions: Run `sudo pro fix USN-7544-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.2 python3-pkg-resources - 68.1.2-2ubuntu1.2 python3-setuptools - 68.1.2-2ubuntu1.2 python3-setuptools-whl - 68.1.2-2ubuntu1.2 No subscription required Medium CVE-2025-47273 USN-7545-1 -- Apport vulnerability Ubuntu 24.04 LTS Qualys discovered that Apport incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to leak sensitive information. Update Instructions: Run `sudo pro fix USN-7545-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apport - 2.28.1-0ubuntu3.6 apport-core-dump-handler - 2.28.1-0ubuntu3.6 apport-gtk - 2.28.1-0ubuntu3.6 apport-kde - 2.28.1-0ubuntu3.6 apport-noui - 2.28.1-0ubuntu3.6 apport-retrace - 2.28.1-0ubuntu3.6 apport-valgrind - 2.28.1-0ubuntu3.6 dh-apport - 2.28.1-0ubuntu3.6 python3-apport - 2.28.1-0ubuntu3.6 python3-problem-report - 2.28.1-0ubuntu3.6 No subscription required Medium CVE-2025-5054 USN-7545-2 -- Apport regression Ubuntu 24.04 LTS USN-7545-1 fixed a vulnerability in Apport. The update introduced a regression that prevented core dumps from being generated inside containers. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Qualys discovered that Apport incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to leak sensitive information. Update Instructions: Run `sudo pro fix USN-7545-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apport - 2.28.1-0ubuntu3.7 apport-core-dump-handler - 2.28.1-0ubuntu3.7 apport-gtk - 2.28.1-0ubuntu3.7 apport-kde - 2.28.1-0ubuntu3.7 apport-noui - 2.28.1-0ubuntu3.7 apport-retrace - 2.28.1-0ubuntu3.7 apport-valgrind - 2.28.1-0ubuntu3.7 dh-apport - 2.28.1-0ubuntu3.7 python3-apport - 2.28.1-0ubuntu3.7 python3-problem-report - 2.28.1-0ubuntu3.7 No subscription required None https://launchpad.net/bugs/2112272 USN-7547-1 -- Tornado vulnerability Ubuntu 24.04 LTS It was discovered that Tornado inefficiently handled requests when parsing certain form data. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. This issue was only addressed in Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2025-47287) Update Instructions: Run `sudo pro fix USN-7547-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-tornado-doc - 6.4.0-1ubuntu0.2 python3-tornado - 6.4.0-1ubuntu0.2 No subscription required Medium CVE-2025-47287 USN-7548-1 -- MariaDB vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in MariaDB and this update includes a new upstream MariaDB version to fix these issues. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-7548-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmariadb-dev - 1:10.11.13-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.13-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.13-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.13-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.13-0ubuntu0.24.04.1 mariadb-client - 1:10.11.13-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.13-0ubuntu0.24.04.1 mariadb-common - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-lzo - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.13-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.13-0ubuntu0.24.04.1 mariadb-test - 1:10.11.13-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.13-0ubuntu0.24.04.1 No subscription required Medium CVE-2023-52969 CVE-2023-52970 CVE-2023-52971 CVE-2025-30693 CVE-2025-30722 USN-7549-1 -- Twig vulnerability Ubuntu 24.04 LTS It was discovered that Twig did not correctly handle securing user input. An attacker could possibly use this issue to cause Twig to expose sensitive information if it opened a specially crafted file. (CVE-2024-45411) Update Instructions: Run `sudo pro fix USN-7549-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php-twig - 3.8.0-2ubuntu1 php-twig-cache-extra - 3.8.0-2ubuntu1 php-twig-cssinliner-extra - 3.8.0-2ubuntu1 php-twig-doc - 3.8.0-2ubuntu1 php-twig-extra-bundle - 3.8.0-2ubuntu1 php-twig-html-extra - 3.8.0-2ubuntu1 php-twig-inky-extra - 3.8.0-2ubuntu1 php-twig-intl-extra - 3.8.0-2ubuntu1 php-twig-markdown-extra - 3.8.0-2ubuntu1 php-twig-string-extra - 3.8.0-2ubuntu1 No subscription required Medium CVE-2024-45411 USN-7551-1 -- libvpx vulnerability Ubuntu 24.04 LTS It was discovered that libvpx did not properly manage memory. An attacker could possibly use this issue to cause applications using libvpx to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7551-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.2 libvpx-doc - 1.14.0-1ubuntu2.2 libvpx9 - 1.14.0-1ubuntu2.2 vpx-tools - 1.14.0-1ubuntu2.2 No subscription required Medium CVE-2025-5283 USN-7555-1 -- Django vulnerability Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain unescaped request paths. An attacker could possibly use this issue to perform a log injection. Update Instructions: Run `sudo pro fix USN-7555-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.8 python3-django - 3:4.2.11-1ubuntu1.8 No subscription required Low CVE-2025-48432 USN-7556-1 -- Bootstrap vulnerabilities Ubuntu 24.04 LTS It was discovered that Bootstrap did not correctly sanitize certain input in the carousel component. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2024-6484, CVE-2024-6531) It was discovered that Bootstrap did not correctly sanitize certain input in the button plugin. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2024-6485) Update Instructions: Run `sudo pro fix USN-7556-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fonts-glyphicons-halflings - 1.009~3.4.1+dfsg-3+deb12u1build0.24.04.1 No subscription required libjs-bootstrap - 3.4.1+dfsg-3+deb12u1build0.24.04.1 No subscription required libjs-bootstrap4 - 4.6.1+dfsg1-4+deb12u1build0.24.04.1 No subscription required Medium CVE-2024-6484 CVE-2024-6531 CVE-2024-6485 USN-7558-1 -- GStreamer Bad Plugins vulnerabilities Ubuntu 24.04 LTS It was discovered that the AV1 codec plugin in GStreamer could be made to write out of bounds. An attacker could possibly use this issue to cause applications using the plugin to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-50186, CVE-2024-0444) It was discovered that the H265 codec plugin in GStreamer could be made to write out of bounds. An attacker could possibly use this issue to cause applications using the plugin to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-3887) Update Instructions: Run `sudo pro fix USN-7558-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gst-plugins-bad-1.0 - 1.24.2-1ubuntu4+esm1 gstreamer1.0-opencv - 1.24.2-1ubuntu4+esm1 gstreamer1.0-plugins-bad - 1.24.2-1ubuntu4+esm1 gstreamer1.0-plugins-bad-apps - 1.24.2-1ubuntu4+esm1 libgstreamer-opencv1.0-0 - 1.24.2-1ubuntu4+esm1 libgstreamer-plugins-bad1.0-0 - 1.24.2-1ubuntu4+esm1 libgstreamer-plugins-bad1.0-dev - 1.24.2-1ubuntu4+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2023-50186 CVE-2024-0444 CVE-2025-3887 USN-7559-1 -- systemd vulnerability Ubuntu 24.04 LTS Qualys discovered that systemd incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to expose sensitive information. Update Instructions: Run `sudo pro fix USN-7559-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnss-myhostname - 255.4-1ubuntu8.8 libnss-mymachines - 255.4-1ubuntu8.8 libnss-resolve - 255.4-1ubuntu8.8 libnss-systemd - 255.4-1ubuntu8.8 libpam-systemd - 255.4-1ubuntu8.8 libsystemd-dev - 255.4-1ubuntu8.8 libsystemd-shared - 255.4-1ubuntu8.8 libsystemd0 - 255.4-1ubuntu8.8 libudev-dev - 255.4-1ubuntu8.8 libudev1 - 255.4-1ubuntu8.8 systemd - 255.4-1ubuntu8.8 systemd-boot - 255.4-1ubuntu8.8 systemd-boot-efi - 255.4-1ubuntu8.8 systemd-container - 255.4-1ubuntu8.8 systemd-coredump - 255.4-1ubuntu8.8 systemd-dev - 255.4-1ubuntu8.8 systemd-homed - 255.4-1ubuntu8.8 systemd-journal-remote - 255.4-1ubuntu8.8 systemd-oomd - 255.4-1ubuntu8.8 systemd-resolved - 255.4-1ubuntu8.8 systemd-standalone-sysusers - 255.4-1ubuntu8.8 systemd-standalone-tmpfiles - 255.4-1ubuntu8.8 systemd-sysv - 255.4-1ubuntu8.8 systemd-tests - 255.4-1ubuntu8.8 systemd-timesyncd - 255.4-1ubuntu8.8 systemd-ukify - 255.4-1ubuntu8.8 systemd-userdbd - 255.4-1ubuntu8.8 udev - 255.4-1ubuntu8.8 No subscription required Medium CVE-2025-4598 USN-7561-1 -- AMD Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that AMD Microcode incorrectly handled memory addresses. An attacker with local administrator privilege could possibly use this issue to cause loss of integrity of a confidential guest running under AMD SEV-SNP. (CVE-2023-20584, CVE-2023-31356) Josh Eads, Kristoffer Janke, Eduardo Nava, Tavis Ormandy and Matteo Rizzo discovered that AMD Microcode incorrectly verified signatures. An attacker with local administrator privilege could possibly use this issue to cause loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP. (CVE-2024-56161) Update Instructions: Run `sudo pro fix USN-7561-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amd64-microcode - 3.20250311.1ubuntu0.24.04.1 No subscription required Medium CVE-2024-56161 CVE-2023-20584 CVE-2023-31356 USN-7562-1 -- Tomcat vulnerabilities Ubuntu 24.04 LTS It was discovered that Tomcat did not include the secure attribute for session cookies when using the RemoteIpFilter with requests from a reverse proxy. An attacker could possibly use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-28708) It was discovered that Tomcat incorrectly recycled certain objects, which could lead to information leaking from one request to the next. An attacker could potentially use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-42795) It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2023-45648) It was discovered that Tomcat incorrectly handled incomplete POST requests, which could cause error responses to contain data from previous requests. An attacker could potentially use this issue to leak sensitive information. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS and for tomcat9 on Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2024-21733) It was discovered that Tomcat incorrectly handled socket cleanup, which could lead to websocket connections staying open. An attacker could possibly use this issue to cause a denial of service. This issue was fixed for tomcat8 on Ubuntu 18.04 LTS, tomcat9 on Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-23672) It was discovered that Tomcat incorrectly handled HTTP/2 requests that exceeded configured header limits. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-24549) It was discovered that Tomcat incorrectly handled some cases of excessive HTTP headers when processing HTTP/2 streams. This led to miscounting of active streams and incorrect timeout handling. An attacker could possibly use this issue to cause connections to remain open indefinitely, leading to a denial of service. This issue was fixed for tomcat9 on Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-34750) It was discovered that Tomcat incorrectly handled TLS handshake processes under certain configurations. An attacker could possibly use this issue to cause a denial of service. This issue was fixed for tomcat9 on Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04, and for tomcat10 on Ubuntu 24.04 LTS. (CVE-2024-38286) Update Instructions: Run `sudo pro fix USN-7562-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat10-embed-java - 10.1.16-1ubuntu0.1~esm2 libtomcat10-java - 10.1.16-1ubuntu0.1~esm2 tomcat10 - 10.1.16-1ubuntu0.1~esm2 tomcat10-admin - 10.1.16-1ubuntu0.1~esm2 tomcat10-common - 10.1.16-1ubuntu0.1~esm2 tomcat10-docs - 10.1.16-1ubuntu0.1~esm2 tomcat10-examples - 10.1.16-1ubuntu0.1~esm2 tomcat10-user - 10.1.16-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro libtomcat9-java - 9.0.70-2ubuntu0.1+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-24549 CVE-2024-34750 CVE-2024-23672 CVE-2023-42795 CVE-2024-38286 CVE-2023-45648 CVE-2023-28708 CVE-2024-21733 LSN-0104-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-51781) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.(CVE-2024-26581) In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of- bounds read when parsing the netlink attributes.(CVE-2024-26597) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 104 Livepatch subscription required High CVE-2023-6270 CVE-2023-51781 CVE-2024-26597 CVE-2024-26581 LSN-0105-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that the netfilter connection tracker for netlink in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion).(CVE-2023-7192) In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.(CVE-2024-26642) In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that 'bytes_left' is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.(CVE-2024-26828) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 105 Livepatch subscription required High CVE-2023-7192 CVE-2024-26642 CVE-2023-6270 CVE-2024-26828 CVE-2024-26924 LSN-0106-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow timeout for anonymous sets Never used from userspace, disallow these parameters.(CVE-2023-52620) In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.(CVE-2024-26585) In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following: - side A configures the n_gsm in basic option mode - side B sends the header of a basic option mode frame with data length 1 - side A switches to advanced option mode - side B sends 2 data bytes which exceeds gsm->len Reason: gsm->len is not used in advanced option mode. - side A switches to basic option mode - side B keeps sending until gsm0_receive() writes past gsm->buf Reason: Neither gsm->state nor gsm->len have been reset after reconfiguration. Fix this by changing gsm->count to gsm->len comparison from equal to less than. Also add upper limit checks against the constant MAX_MRU in gsm0_receive() and gsm1_receive() to harden against memory corruption of gsm->len and gsm->mru. All other checks remain as we still need to limit the data according to the user configuration and actual payload size.(CVE-2024-36016) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 106 Livepatch subscription required High CVE-2024-36016 CVE-2024-26585 CVE-2023-52620 LSN-0107-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V count=2 inflight=1 close(V) // V count=1 inflight=1 // GC candidate condition met for u in gc_inflight_list: if (total_refs == inflight_refs) add u to gc_candidates // gc_candidates={L, V} for u in gc_candidates: scan_children(u, dec_inflight) // embryo (skb1) was not // reachable from L yet, so V's // inflight remains unchanged __skb_queue_tail(L, skb1) unix_state_unlock(L) for u in gc_candidates: if (u.inflight) scan_children(u, inc_inflight_move_tail) // V count=1 inflight=2 (!) If there is a GC-candidate listening socket, lock/unlock its state. This makes GC wait until the end of any ongoing connect() to that socket. After flipping the lock, a possibly SCM-laden embryo is already enqueued. And if there is another embryo coming, it can not possibly carry SCM_RIGHTS. At this point, unix_inflight() can not happen because unix_gc_lock is already taken. Inflight graph remains unaffected.)(CVE-2024-26923) In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previously a theoretical window where swapoff() could run and teardown a swap_info_struct while a call to free_swap_and_cache() was running in another thread. This could cause, amongst other bad possibilities, swap_page_trans_huge_swapped() (called by free_swap_and_cache()) to access the freed memory for swap_map. This is a theoretical problem and I haven't been able to provoke it from a test case. But there has been agreement based on code review that this is possible (see link below). Fix it by using get_swap_device()/put_swap_device(), which will stall swapoff(). There was an extra check in _swap_info_get() to confirm that the swap entry was not free. This isn't present in get_swap_device() because it doesn't make sense in general due to the race between getting the reference and swapoff. So I've added an equivalent check directly in free_swap_and_cache(). Details of how to provoke one possible issue (thanks to David Hildenbrand for deriving this): --8<----- __swap_entry_free() might be the last user and result in 'count == SWAP_HAS_CACHE'. swapoff->try_to_unuse() will stop as soon as soon as si->inuse_pages==0. So the question is: could someone reclaim the folio and turn si->inuse_pages==0, before we completed swap_page_trans_huge_swapped(). Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are still references by swap entries. Process 1 still references subpage 0 via swap entry. Process 2 still references subpage 1 via swap entry. Process 1 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE [then, preempted in the hypervisor etc.] Process 2 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls __try_to_reclaim_swap(). __try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()-> put_swap_folio()->free_swap_slot()->swapcache_free_entries()-> swap_entry_free()->swap_range_free()-> ... WRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries); What stops swapoff to succeed after process 2 reclaimed the swap cache but before process1 finished its call to swap_page_trans_huge_swapped()? --8<-----)(CVE-2024-26960) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge whether the sco disconnection is timeout. The sock will be deallocated later, but it is dereferenced again in sco_sock_timeout. As a result, the use-after-free bugs will happen. The root cause is shown below: Cleanup Thread Worker Thread sco_sock_release sco_sock_close __sco_sock_close sco_sock_set_timer schedule_delayed_work sco_sock_kill (wait a time) sock_put(sk) //FREE sco_sock_timeout sock_hold(sk) //USE The KASAN report triggered by POC is shown below: [ 95.890016 ================================================================== [ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0 [ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7 ... [ 95.890755] Workqueue: events sco_sock_timeout [ 95.890755] Call Trace: [ 95.890755] <TASK> [ 95.890755] dump_stack_lvl+0x45/0x110 [ 95.890755] print_address_description+0x78/0x390 [ 95.890755 print_report+0x11b/0x250 [ 95.890755] ? __virt_addr_valid+0xbe/0xf0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_report+0x139/0x170 [ 95.890755] ? update_load_avg+0xe5/0x9f0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_check_range+0x2c3/0x2e0 [ 95.890755] sco_sock_timeout+0x5e/0x1c0 [ 95.890755] process_one_work+0x561/0xc50 [ 95.890755 worker_thread+0xab2/0x13c0 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] kthread+0x279/0x300 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755] ret_from_fork+0x34/0x60 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755 ret_from_fork_asm+0x11/0x20 [ 95.890755] </TASK> [ 95.890755] [ 95.890755 Allocated by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755 __kasan_kmalloc+0x86/0x90 [ 95.890755] __kmalloc+0x17f/0x360 [ 95.890755 sk_prot_alloc+0xe1/0x1a0 [ 95.890755] sk_alloc+0x31/0x4e0 [ 95.890755 bt_sock_alloc+0x2b/0x2a0 [ 95.890755] sco_sock_create+0xad/0x320 [ 95.890755] bt_sock_create+0x145/0x320 [ 95.890755 __sock_create+0x2e1/0x650 [ 95.890755] __sys_socket+0xd0/0x280 [ 95.890755 __x64_sys_socket+0x75/0x80 [ 95.890755] do_syscall_64+0xc4/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] Freed by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755] kasan_save_free_info+0x40/0x50 [ 95.890755 poison_slab_object+0x118/0x180 [ 95.890755] __kasan_slab_free+0x12/0x30 [ 95.890755] kfree+0xb2/0x240 [ 95.890755] __sk_destruct+0x317/0x410 [ 95.890755] sco_sock_release+0x232/0x280 [ 95.890755] sock_close+0xb2/0x210 [ 95.890755] __fput+0x37f/0x770 [ 95.890755] task_work_run+0x1ae/0x210 [ 95.890755] get_signal+0xe17/0xf70 [ 95.890755 arch_do_signal_or_restart+0x3f/0x520 [ 95.890755 syscall_exit_to_user_mode+0x55/0x120 [ 95.890755] do_syscall_64+0xd1/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] The buggy address belongs to the object at ffff88800c388000 [ 95.890755] which belongs to the cache kmalloc-1k of size 1024 [ 95.890755 The buggy address is located 128 bytes inside of [ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400) [ 95.890755] [ 95.890755] The buggy address belongs to the physical page: [ 95.890755 page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388 [ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 95.890755] ano ---truncated---)(CVE-2024-27398) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 107 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 107 Livepatch subscription required High CVE-2024-38630 CVE-2024-27398 CVE-2024-26923 CVE-2024-26960 CVE-2024-26921 LSN-0108-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request goes to the backlog and crypto_aead_decrypt returns -EBUSY, tls_do_decryption will wait until all async decryptions have completed. If one of them fails, tls_do_decryption will return -EBADMSG and tls_decrypt_sg jumps to the error path, releasing all the pages. But the pages have been passed to the async callback, and have already been released by tls_decrypt_done. The only true async case is when crypto_aead_decrypt returns -EINPROGRESS. With -EBUSY, we already waited so we can tell tls_sw_recvmsg that the data is available for immediate copy, but we need to notify tls_decrypt_sg (via the new ->async_done flag) that the memory has already been released.)(CVE-2024-26800) In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previously a theoretical window where swapoff() could run and teardown a swap_info_struct while a call to free_swap_and_cache() was running in another thread. This could cause, amongst other bad possibilities, swap_page_trans_huge_swapped() (called by free_swap_and_cache()) to access the freed memory for swap_map. This is a theoretical problem and I haven't been able to provoke it from a test case. But there has been agreement based on code review that this is possible (see link below). Fix it by using get_swap_device()/put_swap_device(), which will stall swapoff(). There was an extra check in _swap_info_get() to confirm that the swap entry was not free. This isn't present in get_swap_device() because it doesn't make sense in general due to the race between getting the reference and swapoff. So I've added an equivalent check directly in free_swap_and_cache(). Details of how to provoke one possible issue (thanks to David Hildenbrand for deriving this): --8<----- __swap_entry_free() might be the last user and result in 'count == SWAP_HAS_CACHE'. swapoff->try_to_unuse() will stop as soon as soon as si->inuse_pages==0. So the question is: could someone reclaim the folio and turn si->inuse_pages==0, before we completed swap_page_trans_huge_swapped(). Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are still references by swap entries. Process 1 still references subpage 0 via swap entry. Process 2 still references subpage 1 via swap entry. Process 1 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE [then, preempted in the hypervisor etc.] Process 2 quits. Calls free_swap_and_cache(). -> count == SWAP_HAS_CACHE Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls __try_to_reclaim_swap(). __try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()-> put_swap_folio()->free_swap_slot()->swapcache_free_entries()-> swap_entry_free()->swap_range_free()-> ... WRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries); What stops swapoff to succeed after process 2 reclaimed the swap cache but before process1 finished its call to swap_page_trans_huge_swapped()? --8<-----)(CVE-2024-26960) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge whether the sco disconnection is timeout. The sock will be deallocated later, but it is dereferenced again in sco_sock_timeout. As a result, the use-after-free bugs will happen. The root cause is shown below: Cleanup Thread Worker Thread sco_sock_release sco_sock_close __sco_sock_close sco_sock_set_timer schedule_delayed_work sco_sock_kill (wait a time) sock_put(sk) //FREE sco_sock_timeout sock_hold(sk) //USE The KASAN report triggered by POC is shown below: [ 95.890016 ================================================================== [ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0 [ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7 ... [ 95.890755] Workqueue: events sco_sock_timeout [ 95.890755] Call Trace: [ 95.890755] <TASK> [ 95.890755] dump_stack_lvl+0x45/0x110 [ 95.890755] print_address_description+0x78/0x390 [ 95.890755 print_report+0x11b/0x250 [ 95.890755] ? __virt_addr_valid+0xbe/0xf0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_report+0x139/0x170 [ 95.890755] ? update_load_avg+0xe5/0x9f0 [ 95.890755] ? sco_sock_timeout+0x5e/0x1c0 [ 95.890755 kasan_check_range+0x2c3/0x2e0 [ 95.890755] sco_sock_timeout+0x5e/0x1c0 [ 95.890755] process_one_work+0x561/0xc50 [ 95.890755 worker_thread+0xab2/0x13c0 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] kthread+0x279/0x300 [ 95.890755] ? pr_cont_work+0x490/0x490 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755] ret_from_fork+0x34/0x60 [ 95.890755] ? kthread_blkcg+0xa0/0xa0 [ 95.890755 ret_from_fork_asm+0x11/0x20 [ 95.890755] </TASK> [ 95.890755] [ 95.890755 Allocated by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755 __kasan_kmalloc+0x86/0x90 [ 95.890755] __kmalloc+0x17f/0x360 [ 95.890755 sk_prot_alloc+0xe1/0x1a0 [ 95.890755] sk_alloc+0x31/0x4e0 [ 95.890755 bt_sock_alloc+0x2b/0x2a0 [ 95.890755] sco_sock_create+0xad/0x320 [ 95.890755] bt_sock_create+0x145/0x320 [ 95.890755 __sock_create+0x2e1/0x650 [ 95.890755] __sys_socket+0xd0/0x280 [ 95.890755 __x64_sys_socket+0x75/0x80 [ 95.890755] do_syscall_64+0xc4/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] Freed by task 506: [ 95.890755] kasan_save_track+0x3f/0x70 [ 95.890755] kasan_save_free_info+0x40/0x50 [ 95.890755 poison_slab_object+0x118/0x180 [ 95.890755] __kasan_slab_free+0x12/0x30 [ 95.890755] kfree+0xb2/0x240 [ 95.890755] __sk_destruct+0x317/0x410 [ 95.890755] sco_sock_release+0x232/0x280 [ 95.890755] sock_close+0xb2/0x210 [ 95.890755] __fput+0x37f/0x770 [ 95.890755] task_work_run+0x1ae/0x210 [ 95.890755] get_signal+0xe17/0xf70 [ 95.890755 arch_do_signal_or_restart+0x3f/0x520 [ 95.890755 syscall_exit_to_user_mode+0x55/0x120 [ 95.890755] do_syscall_64+0xd1/0x1b0 [ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] The buggy address belongs to the object at ffff88800c388000 [ 95.890755] which belongs to the cache kmalloc-1k of size 1024 [ 95.890755 The buggy address is located 128 bytes inside of [ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400) [ 95.890755] [ 95.890755] The buggy address belongs to the physical page: [ 95.890755 page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388 [ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 95.890755] ano ---truncated---)(CVE-2024-27398) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions check, meaning the execution may gain unintended privileges. For example, if a file could change permissions from executable and not set-id: ---------x 1 root root 16048 Aug 7 13:16 target to set-id and non- executable: ---S------ 1 root root 16048 Aug 7 13:16 target it is possible to gain root privileges when execution should have been disallowed. While this race condition is rare in real-world scenarios, it has been observed (and proven exploitable) when package managers are updating the setuid bits of installed programs. Such files start with being world-executable but then are adjusted to be group-exec with a set-uid bit. For example, 'chmod o-x,u+s target' makes 'target' executable only by uid 'root' and gid 'cdrom', while also becoming setuid-root: -rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target becomes: -rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target But racing the chmod means users without group 'cdrom' membership can get the permission to execute 'target' just before the chmod, and when the chmod finishes, the exec reaches brpm_fill_uid(), and performs the setuid to root, violating the expressed authorization of 'only cdrom group members can setuid to root'. Re-check that we still have execute permissions in case the metadata has changed. It would be better to keep a copy from the perm-check time, but until we can do that refactoring, the least-bad option is to do a full inode_permission() call (under inode lock). It is understood that this is safe against dead-locks, but hardly optimal.)(CVE-2024-43882) In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-50264) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 108 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 108 Livepatch subscription required High CVE-2024-26960 CVE-2024-26800 CVE-2024-27398 CVE-2024-50264 CVE-2024-26921 CVE-2024-43882 CVE-2024-38630 LSN-0109-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request goes to the backlog and crypto_aead_decrypt returns -EBUSY, tls_do_decryption will wait until all async decryptions have completed. If one of them fails, tls_do_decryption will return -EBADMSG and tls_decrypt_sg jumps to the error path, releasing all the pages. But the pages have been passed to the async callback, and have already been released by tls_decrypt_done. The only true async case is when crypto_aead_decrypt returns -EINPROGRESS. With -EBUSY, we already waited so we can tell tls_sw_recvmsg that the data is available for immediate copy, but we need to notify tls_decrypt_sg (via the new ->async_done flag) that the memory has already been released.)(CVE-2024-26800) In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline. Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ('inet: frag: Always orphan skbs inside ip_defrag()') [.. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this: If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow. This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered. This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue. In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine. In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.)(CVE-2024-26921) In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer() could not stop it and will return directly. If the port region is released by release_region() and then the timer handler cpu5wdt_trigger() calls outb() to write into the region that is released, the use-after-free bug will happen. Change del_timer() to timer_shutdown_sync() in order that the timer handler could be finished before the port region is released.)(CVE-2024-38630) In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions check, meaning the execution may gain unintended privileges. For example, if a file could change permissions from executable and not set-id: ---------x 1 root root 16048 Aug 7 13:16 target to set-id and non- executable: ---S------ 1 root root 16048 Aug 7 13:16 target it is possible to gain root privileges when execution should have been disallowed. While this race condition is rare in real-world scenarios, it has been observed (and proven exploitable) when package managers are updating the setuid bits of installed programs. Such files start with being world-executable but then are adjusted to be group-exec with a set-uid bit. For example, 'chmod o-x,u+s target' makes 'target' executable only by uid 'root' and gid 'cdrom', while also becoming setuid-root: -rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target becomes: -rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target But racing the chmod means users without group 'cdrom' membership can get the permission to execute 'target' just before the chmod, and when the chmod finishes, the exec reaches brpm_fill_uid(), and performs the setuid to root, violating the expressed authorization of 'only cdrom group members can setuid to root'. Re-check that we still have execute permissions in case the metadata has changed. It would be better to keep a copy from the perm-check time, but until we can do that refactoring, the least-bad option is to do a full inode_permission() call (under inode lock). It is understood that this is safe against dead-locks, but hardly optimal.)(CVE-2024-43882) In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-50264) In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to NULL, which could lead to a dangling pointer. This issue is resolved by initializing vsk->trans to NULL.)(CVE-2024-53103) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 109 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 109 Livepatch subscription required High CVE-2024-26921 CVE-2024-38630 CVE-2024-43882 CVE-2024-50264 CVE-2024-26800 CVE-2024-53103 LSN-0110-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc Any unprivileged user can attach N_GSM0710 ldisc, but it requires CAP_NET_ADMIN to create a GSM network anyway. Require initial namespace CAP_NET_ADMIN to do that.)(CVE-2023-52880) In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc. Then the packet itself gets parsed to populate the rest of the keys from the packet headers. Whenever the packet parsing code starts parsing the ICMPv6 header, it first zeroes out fields in the key corresponding to Neighbor Discovery information even if it is not an ND packet. It is an 'ipv6.nd' field. However, the 'ipv6' is a union that shares the space between 'nd' and 'ct_orig' that holds the original tuple conntrack metadata parsed from the OVS_PACKET_ATTR_KEY. ND packets should not normally have conntrack state, so it's fine to share the space, but normal ICMPv6 Echo packets or maybe other types of ICMPv6 can have the state attached and it should not be overwritten. The issue results in all but the last 4 bytes of the destination address being wiped from the original conntrack tuple leading to incorrect packet matching and potentially executing wrong actions in case this packet recirculates within the datapath or goes back to userspace. ND fields should not be accessed in non-ND packets, so not clearing them should be fine. Executing memset() only for actual ND packets to avoid the issue. Initializing the whole thing before parsing is needed because ND packet may not contain all the options. The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't affect packets entering OVS datapath from network interfaces, because in this case CT metadata is populated from skb after the packet is already parsed.)(CVE-2024-38558) In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.)(CVE-2024-53104) In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative dumping of data. It provides the families the following ops: - start - (optional) kicks off the dumping process - dump - actual dump helper, keeps getting called until it returns 0 - done - (optional) pairs with .start, can be used for cleanup The whole process is asynchronous and the repeated calls to .dump don't actually happen in a tight loop, but rather are triggered in response to recvmsg() on the socket. This gives the user full control over the dump, but also means that the user can close the socket without getting to the end of the dump. To make sure .start is always paired with .done we check if there is an ongoing dump before freeing the socket, and if so call .done. The complication is that sockets can get freed from BH and .done is allowed to sleep. So we use a workqueue to defer the call, when needed. Unfortunately this does not work correctly. What we defer is not the cleanup but rather releasing a reference on the socket. We have no guarantee that we own the last reference, if someone else holds the socket they may release it in BH and we're back to square one. The whole dance, however, appears to be unnecessary. Only the user can interact with dumps, so we can clean up when socket is closed. And close always happens in process context. Some async code may still access the socket after close, queue notification skbs to it etc. but no dumps can start, end or otherwise make progress. Delete the workqueue and flush the dump state directly from the release handler. Note that further cleanup is possible in -next, for instance we now always call .done before releasing the main module reference, so dump doesn't have to take a reference of its own.)(CVE-2024-53140) In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672) Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code.)(CVE-2025-0927) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 110 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 110 Livepatch subscription required High CVE-2024-53140 CVE-2023-52880 CVE-2024-53104 CVE-2024-56672 CVE-2025-0927 CVE-2024-38558 LSN-0111-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS It was discovered that the watch_queue event notification system contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or escalate their privileges.)(CVE-2022-0995) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-26928) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-35864) In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero- initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.)(CVE-2024-50302) In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it. On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks. This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity. So, add explicit guards to prevent potential risk of OOM issues.)(CVE-2024-53063) In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.)(CVE-2024-56595) In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672) In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.)(CVE-2024-57798) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 111 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 111 Livepatch subscription required High CVE-2024-50302 CVE-2024-26928 CVE-2024-53063 CVE-2024-35864 CVE-2024-56595 CVE-2024-57798 CVE-2024-56672 CVE-2022-0995 LSN-0112-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: nfsd: fix use-after-free due to delegation race A delegation break could arrive as soon as we've called vfs_setlease. A delegation break runs a callback which immediately (in nfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we then exit nfs4_set_delegation without hashing the delegation, it will be freed as soon as the callback is done with it, without ever being removed from del_recall_lru. Symptoms show up later as use-after-free or list corruption warnings, usually in the laundromat thread. I suspect aba2072f4523 'nfsd: grant read delegations to clients holding writes' made this bug easier to hit, but I looked as far back as v3.0 and it looks to me it already had the same problem. So I'm not sure where the bug was introduced; it may have been there from the beginning.)(CVE-2021-47506) Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or escalate their privileges.)(CVE-2022-0995) In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic leak in ring data allocation/free, where aq_ring_free could be called multiple times on same ring, if system is under stress and got memory allocation error. Ring pointer was used as an indicator of failure, but this is not correct since only ring data is allocated/deallocated. Ring itself is an array member. Changing ring allocation functions to return error code directly. This simplifies error handling and eliminates aq_ring_free on higher layer.)(CVE-2023-52664) In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), 'use after free' error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This implies before the refcount could be increment here, it was freed. In same file, in 'handle_cap_grant()' refcount is decremented by this line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race occurred and resource was freed by the latter line before the former line could increment it. encode_cap_msg() is called by __send_cap() and __send_cap() is called by ceph_check_caps() after calling __prep_cap(). __prep_cap() is where arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where the refcount must be increased to prevent 'use after free' error.)(CVE-2024-26689) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-35864) In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero- initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.)(CVE-2024-50302) In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it. On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks. This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity. So, add explicit guards to prevent potential risk of OOM issues.)(CVE-2024-53063) In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.)(CVE-2024-53150) In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 (CVE-2024-53168) In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.)(CVE-2024-53197) In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 (CVE-2024-56551) In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue. The problem is the number of entries in the pre-allocated sgtable, it is nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) >> 4 + 1. Given the default [rt]xglom_size=32 it's actually 35 which is too small. Worst case, the pkt queue can end up with 64 SKBs. This occurs when a new SKB is added for each original SKB if tailroom isn't enough to hold tail_pad. At least one sg entry is needed for each SKB. So, eventually the 'skb_queue_walk loop' in brcmf_sdiod_sglist_rw may run out of sg entries. This makes sg_next return NULL and this causes the oops. The patch sets nents to max(rxglom_size, txglom_size) * 2 to be able handle the worst- case. Btw. this requires only 64-35=29 * 16 (or 20 if CONFIG_NEED_SG_DMA_LENGTH) = 464 additional bytes of memory.)(CVE-2024-56593) In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.)(CVE-2024-56595) In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.)(CVE-2024-56598) In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump hci_devcd_append may lead to the release of the skb, so it cannot be accessed once it is called. (CVE-2024-56653) In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.)(CVE-2024-57798) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 112 lkp_Ubuntu_6_8_0[_|\d]+_oracle_(\d+) - 112 Livepatch subscription required High CVE-2022-0995 CVE-2024-53168 CVE-2024-56551 CVE-2024-56598 CVE-2024-35864 CVE-2024-56653 CVE-2024-53063 CVE-2021-47506 CVE-2024-53150 CVE-2024-53197 CVE-2024-56593 CVE-2024-50302 CVE-2024-57798 CVE-2024-56595 CVE-2023-52664 CVE-2024-26689 /etc/lsb-release ^[\s\S]*DISTRIB_CODENAME=([a-z]+)$ 1 oval:com.ubuntu.noble:var:681610000000 oval:com.ubuntu.noble:var:681610000020 oval:com.ubuntu.noble:var:681610000040 oval:com.ubuntu.noble:var:681610000060 oval:com.ubuntu.noble:var:681610000080 oval:com.ubuntu.noble:var:681710000000 oval:com.ubuntu.noble:var:681710000020 oval:com.ubuntu.noble:var:681720000000 oval:com.ubuntu.noble:var:681730000000 oval:com.ubuntu.noble:var:681730000020 oval:com.ubuntu.noble:var:686310000000 oval:com.ubuntu.noble:var:686310000020 oval:com.ubuntu.noble:var:686310000040 oval:com.ubuntu.noble:var:686310000060 oval:com.ubuntu.noble:var:686310000080 oval:com.ubuntu.noble:var:686410000000 oval:com.ubuntu.noble:var:686410000020 oval:com.ubuntu.noble:var:686420000000 oval:com.ubuntu.noble:var:686420000020 oval:com.ubuntu.noble:var:686430000000 oval:com.ubuntu.noble:var:687510000000 oval:com.ubuntu.noble:var:687810000000 oval:com.ubuntu.noble:var:689310000000 oval:com.ubuntu.noble:var:689310000020 oval:com.ubuntu.noble:var:689310000040 oval:com.ubuntu.noble:var:689310000060 oval:com.ubuntu.noble:var:689310000080 oval:com.ubuntu.noble:var:689310000100 oval:com.ubuntu.noble:var:689310000120 oval:com.ubuntu.noble:var:689320000000 oval:com.ubuntu.noble:var:689320000020 oval:com.ubuntu.noble:var:689330000000 oval:com.ubuntu.noble:var:691810000000 oval:com.ubuntu.noble:var:692110000000 oval:com.ubuntu.noble:var:692110000020 oval:com.ubuntu.noble:var:692110000040 oval:com.ubuntu.noble:var:692110000060 oval:com.ubuntu.noble:var:692110000080 oval:com.ubuntu.noble:var:692110000100 oval:com.ubuntu.noble:var:692110000120 oval:com.ubuntu.noble:var:692120000000 oval:com.ubuntu.noble:var:694910000000 oval:com.ubuntu.noble:var:694910000020 oval:com.ubuntu.noble:var:694910000040 oval:com.ubuntu.noble:var:694910000060 oval:com.ubuntu.noble:var:694910000080 oval:com.ubuntu.noble:var:694910000100 oval:com.ubuntu.noble:var:694920000000 oval:com.ubuntu.noble:var:694920000020 oval:com.ubuntu.noble:var:695210000000 oval:com.ubuntu.noble:var:695210000020 oval:com.ubuntu.noble:var:695220000000 oval:com.ubuntu.noble:var:695510000000 oval:com.ubuntu.noble:var:697510000000 oval:com.ubuntu.noble:var:697510000020 oval:com.ubuntu.noble:var:697510000040 oval:com.ubuntu.noble:var:697510000060 oval:com.ubuntu.noble:var:697510000080 oval:com.ubuntu.noble:var:697510000100 oval:com.ubuntu.noble:var:697510000120 oval:com.ubuntu.noble:var:697510000140 oval:com.ubuntu.noble:var:697510000160 oval:com.ubuntu.noble:var:697510000180 oval:com.ubuntu.noble:var:699910000000 oval:com.ubuntu.noble:var:699910000020 oval:com.ubuntu.noble:var:699910000040 oval:com.ubuntu.noble:var:699910000060 oval:com.ubuntu.noble:var:699910000080 oval:com.ubuntu.noble:var:699910000100 oval:com.ubuntu.noble:var:699920000000 oval:com.ubuntu.noble:var:700410000000 oval:com.ubuntu.noble:var:700510000000 oval:com.ubuntu.noble:var:700510000020 oval:com.ubuntu.noble:var:702010000000 oval:com.ubuntu.noble:var:702010000020 oval:com.ubuntu.noble:var:702010000040 oval:com.ubuntu.noble:var:702010000060 oval:com.ubuntu.noble:var:702010000080 oval:com.ubuntu.noble:var:702010000100 oval:com.ubuntu.noble:var:702010000120 oval:com.ubuntu.noble:var:702010000140 oval:com.ubuntu.noble:var:702020000000 oval:com.ubuntu.noble:var:702030000000 oval:com.ubuntu.noble:var:707110000000 oval:com.ubuntu.noble:var:707110000020 oval:com.ubuntu.noble:var:707110000040 oval:com.ubuntu.noble:var:707110000060 oval:com.ubuntu.noble:var:707110000080 oval:com.ubuntu.noble:var:707110000100 oval:com.ubuntu.noble:var:707110000120 oval:com.ubuntu.noble:var:707110000140 oval:com.ubuntu.noble:var:707120000000 oval:com.ubuntu.noble:var:707410000000 oval:com.ubuntu.noble:var:708910000000 oval:com.ubuntu.noble:var:708920000000 oval:com.ubuntu.noble:var:708920000020 oval:com.ubuntu.noble:var:708920000040 oval:com.ubuntu.noble:var:708920000060 oval:com.ubuntu.noble:var:708920000080 oval:com.ubuntu.noble:var:708930000000 oval:com.ubuntu.noble:var:708930000020 oval:com.ubuntu.noble:var:708940000000 oval:com.ubuntu.noble:var:708950000000 oval:com.ubuntu.noble:var:708960000000 oval:com.ubuntu.noble:var:708970000000 oval:com.ubuntu.noble:var:709510000000 oval:com.ubuntu.noble:var:709510000020 oval:com.ubuntu.noble:var:712010000000 oval:com.ubuntu.noble:var:712010000020 oval:com.ubuntu.noble:var:712010000040 oval:com.ubuntu.noble:var:712010000060 oval:com.ubuntu.noble:var:712010000080 oval:com.ubuntu.noble:var:712010000100 oval:com.ubuntu.noble:var:712010000120 oval:com.ubuntu.noble:var:712010000140 oval:com.ubuntu.noble:var:712010000160 oval:com.ubuntu.noble:var:712020000000 oval:com.ubuntu.noble:var:712030000000 oval:com.ubuntu.noble:var:715410000000 oval:com.ubuntu.noble:var:715410000020 oval:com.ubuntu.noble:var:715410000040 oval:com.ubuntu.noble:var:715410000060 oval:com.ubuntu.noble:var:715410000080 oval:com.ubuntu.noble:var:715410000100 oval:com.ubuntu.noble:var:715410000120 oval:com.ubuntu.noble:var:715410000140 oval:com.ubuntu.noble:var:715410000160 oval:com.ubuntu.noble:var:715510000000 oval:com.ubuntu.noble:var:715510000020 oval:com.ubuntu.noble:var:715610000000 oval:com.ubuntu.noble:var:716710000000 oval:com.ubuntu.noble:var:716710000020 oval:com.ubuntu.noble:var:716710000040 oval:com.ubuntu.noble:var:716710000060 oval:com.ubuntu.noble:var:716710000080 oval:com.ubuntu.noble:var:716710000100 oval:com.ubuntu.noble:var:716710000120 oval:com.ubuntu.noble:var:716710000140 oval:com.ubuntu.noble:var:716710000160 oval:com.ubuntu.noble:var:716710000180 oval:com.ubuntu.noble:var:716720000000 oval:com.ubuntu.noble:var:717010000000 oval:com.ubuntu.noble:var:718710000000 oval:com.ubuntu.noble:var:719610000000 oval:com.ubuntu.noble:var:722110000000 oval:com.ubuntu.noble:var:723610000000 oval:com.ubuntu.noble:var:723610000020 oval:com.ubuntu.noble:var:723610000040 oval:com.ubuntu.noble:var:723610000060 oval:com.ubuntu.noble:var:723610000080 oval:com.ubuntu.noble:var:723610000100 oval:com.ubuntu.noble:var:723610000120 oval:com.ubuntu.noble:var:723610000140 oval:com.ubuntu.noble:var:723610000160 oval:com.ubuntu.noble:var:723610000180 oval:com.ubuntu.noble:var:723710000000 oval:com.ubuntu.noble:var:723810000000 oval:com.ubuntu.noble:var:730110000000 oval:com.ubuntu.noble:var:730110000020 oval:com.ubuntu.noble:var:730310000000 oval:com.ubuntu.noble:var:730310000020 oval:com.ubuntu.noble:var:730320000000 oval:com.ubuntu.noble:var:730330000000 oval:com.ubuntu.noble:var:730410000000 oval:com.ubuntu.noble:var:730410000020 oval:com.ubuntu.noble:var:730410000040 oval:com.ubuntu.noble:var:731010000000 oval:com.ubuntu.noble:var:731110000000 oval:com.ubuntu.noble:var:732210000000 oval:com.ubuntu.noble:var:732310000000 oval:com.ubuntu.noble:var:732410000000 oval:com.ubuntu.noble:var:732410000020 oval:com.ubuntu.noble:var:732510000000 oval:com.ubuntu.noble:var:732510000020 oval:com.ubuntu.noble:var:732510000040 oval:com.ubuntu.noble:var:732520000000 oval:com.ubuntu.noble:var:732530000000 oval:com.ubuntu.noble:var:732610000000 oval:com.ubuntu.noble:var:732610000020 oval:com.ubuntu.noble:var:732610000040 oval:com.ubuntu.noble:var:737910000000 oval:com.ubuntu.noble:var:737910000020 oval:com.ubuntu.noble:var:738110000000 oval:com.ubuntu.noble:var:738210000000 oval:com.ubuntu.noble:var:738310000000 oval:com.ubuntu.noble:var:738310000020 oval:com.ubuntu.noble:var:738310000040 oval:com.ubuntu.noble:var:738310000060 oval:com.ubuntu.noble:var:738310000080 oval:com.ubuntu.noble:var:738310000100 oval:com.ubuntu.noble:var:738310000120 oval:com.ubuntu.noble:var:738310000140 oval:com.ubuntu.noble:var:738310000160 oval:com.ubuntu.noble:var:738310000180 oval:com.ubuntu.noble:var:738320000000 oval:com.ubuntu.noble:var:738410000000 oval:com.ubuntu.noble:var:738510000000 oval:com.ubuntu.noble:var:738610000000 oval:com.ubuntu.noble:var:740210000000 oval:com.ubuntu.noble:var:740210000020 oval:com.ubuntu.noble:var:740210000040 oval:com.ubuntu.noble:var:740210000060 oval:com.ubuntu.noble:var:740210000080 oval:com.ubuntu.noble:var:740210000100 oval:com.ubuntu.noble:var:740210000120 oval:com.ubuntu.noble:var:740210000140 oval:com.ubuntu.noble:var:740210000160 oval:com.ubuntu.noble:var:740220000000 oval:com.ubuntu.noble:var:740230000000 oval:com.ubuntu.noble:var:740240000000 oval:com.ubuntu.noble:var:740240000020 oval:com.ubuntu.noble:var:744510000000 oval:com.ubuntu.noble:var:744510000020 oval:com.ubuntu.noble:var:744510000040 oval:com.ubuntu.noble:var:744810000000 oval:com.ubuntu.noble:var:744910000000 oval:com.ubuntu.noble:var:744910000020 oval:com.ubuntu.noble:var:744910000040 oval:com.ubuntu.noble:var:744910000060 oval:com.ubuntu.noble:var:744910000080 oval:com.ubuntu.noble:var:744910000100 oval:com.ubuntu.noble:var:744910000120 oval:com.ubuntu.noble:var:744910000140 oval:com.ubuntu.noble:var:744910000160 oval:com.ubuntu.noble:var:744910000180 oval:com.ubuntu.noble:var:745010000000 oval:com.ubuntu.noble:var:745010000020 oval:com.ubuntu.noble:var:745010000040 oval:com.ubuntu.noble:var:745310000000 oval:com.ubuntu.noble:var:746810000000 oval:com.ubuntu.noble:var:748910000000 oval:com.ubuntu.noble:var:748910000020 oval:com.ubuntu.noble:var:748910000040 oval:com.ubuntu.noble:var:749110000000 oval:com.ubuntu.noble:var:749210000000 oval:com.ubuntu.noble:var:749210000020 oval:com.ubuntu.noble:var:749210000040 oval:com.ubuntu.noble:var:749210000060 oval:com.ubuntu.noble:var:749210000080 oval:com.ubuntu.noble:var:749210000100 oval:com.ubuntu.noble:var:749210000120 oval:com.ubuntu.noble:var:749210000140 oval:com.ubuntu.noble:var:749210000160 oval:com.ubuntu.noble:var:749210000180 oval:com.ubuntu.noble:var:749210000200 oval:com.ubuntu.noble:var:749220000000 oval:com.ubuntu.noble:var:749310000000 oval:com.ubuntu.noble:var:749910000000 oval:com.ubuntu.noble:var:750010000000 oval:com.ubuntu.noble:var:751310000000 oval:com.ubuntu.noble:var:751310000020 oval:com.ubuntu.noble:var:751310000040 oval:com.ubuntu.noble:var:751310000060 oval:com.ubuntu.noble:var:751310000080 oval:com.ubuntu.noble:var:751320000000 oval:com.ubuntu.noble:var:751330000000 oval:com.ubuntu.noble:var:751330000020 oval:com.ubuntu.noble:var:751410000000 oval:com.ubuntu.noble:var:751410000020 oval:com.ubuntu.noble:var:751510000000 oval:com.ubuntu.noble:var:751520000000 oval:com.ubuntu.noble:var:751520000020 oval:com.ubuntu.noble:var:752110000000 oval:com.ubuntu.noble:var:752110000020 oval:com.ubuntu.noble:var:752110000040 oval:com.ubuntu.noble:var:752130000000 oval:com.ubuntu.noble:var:752210000000 oval:com.ubuntu.noble:var:752310000000 oval:com.ubuntu.noble:var:752410000000 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 unix noble 0:3.0.13-0ubuntu3.1 0:41.0.7-4ubuntu0.1 0:2.3.12-1ubuntu0.24.04.1 0:8.5.0-2ubuntu10.1 0:2.4.58-1ubuntu8.1 0:3.8.3-1.1ubuntu3.1 0:10.0.0-2ubuntu8.1 0:2.0.13-4ubuntu0.1 0:2.39-0ubuntu8.1 0:10.2.0-1ubuntu1 0:20240213.00-0ubuntu3.1 0:20240320.00-0ubuntu1~24.04.1 0:1.59.0-1ubuntu0.1 0:590-2ubuntu2.1 0:3.5.1+dfsg1-0ubuntu1 0:2.0.12-1ubuntu1 0:10.0.0-2ubuntu8.2 0:2.80.0-6ubuntu3.1 1:2.23-1ubuntu0.1 0:0.4.4-1ubuntu0.1 0:8.0.105-0ubuntu1~24.04.1 0:8.0.105-8.0.5-0ubuntu1~24.04.1 0:8.0.5-0ubuntu1~24.04.1 0:3.6-2ubuntu0.1 0:1.7.17-1ubuntu0.1~esm2 0:46.2-1~ubuntu24.04.2 0:3.1.2-1ubuntu1.1 0:2.44.2-0ubuntu0.24.04.1 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 4:24.2.3-0ubuntu0.24.04.2 1:2.13.0-3ubuntu2 0:1.19.2-1ubuntu3.1 1:2.43.0-1ubuntu7.1 0:8.4.4-1.1ubuntu6.1 0:4.0.1-7.1ubuntu5.1 0:3.20240514.0ubuntu0.24.04.1 0:1.24.2-1ubuntu0.1 0:3.0.1-3ubuntu0.1 0:1.0.2-2ubuntu1.1 0:16.3-0ubuntu0.24.04.1 7:6.1.1-3ubuntu5+esm1 0:2.39-0ubuntu8.2 0:3.7.2-2ubuntu0.1 0:2.42.10+dfsg-3ubuntu3.1 0:8u412-ga-1~24.04.2 0:1.14.0-1ubuntu2.1 0:3.8.2-2ubuntu0.1 6.8.0-\d+(-raspi) 0:6.8.0-1005 6.8.0-\d+(-ibm) 0:6.8.0-1006 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-35 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-35 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-35 6.8.0-\d+(-gcp) 0:6.8.0-1008 6.8.0-\d+(-aws) 0:6.8.0-1009 6.8.0-\d+(-oem) 0:6.8.0-1006 6.8.0-\d+(-gke) 0:6.8.0-1004 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1008 0:8.0.37-0ubuntu0.24.04.1 0:4.5.1+git230720-4ubuntu2.1 0:1.8-1fakesync1ubuntu0.24.04.1 0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 0:0.76.0-1ubuntu0.1 0:10.02.1~dfsg1-0ubuntu7.1 0:2.9.4-1.1ubuntu6.1 0:2.2.7-1ubuntu0.1 0:3.2.3-1ubuntu0.24.04.1 1:10.11.8-0ubuntu0.24.04.1 0:8.3.6-0ubuntu0.24.04.1 4:5.27.11-0ubuntu4.1 0:2.4.7-1.2ubuntu7.1 0:2.4.7-1.2ubuntu7.2 0:1.0-2ubuntu1.1 0:1.0-2ubuntu1.2 0:1.21.4-1ubuntu4.1 0:2.1.0-4.1ubuntu1.2 1:9.6p1-3ubuntu13.3 0:2.6.9-1ubuntu4.1 6.8.0-\d+(-raspi) 0:6.8.0-1006 6.8.0-\d+(-ibm) 0:6.8.0-1007 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1008 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-36 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-36 6.8.0-\d+(-intel) 0:6.8.0-1006 6.8.0-\d+(-gcp) 0:6.8.0-1009 6.8.0-\d+(-oem) 0:6.8.0-1007 6.8.0-\d+(-aws) 0:6.8.0-1010 6.8.0-\d+(-gke) 0:6.8.0-1005 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1009 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 4:24.2.4-0ubuntu0.24.04.2 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1006 0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 2:24.0.0-0ubuntu1.2 2:24.0.0-0ubuntu1.3 2:28.0.1-0ubuntu1.2 3:29.0.1-0ubuntu1.3 0:2.4.58-1ubuntu8.2 0:2.4.58-1ubuntu8.3 0:2.4.58-1ubuntu8.6 0:1.21.9-1ubuntu0.1 0:1.22.2-2ubuntu0.1 1:9.6p1-3ubuntu13.4 3:4.2.11-1ubuntu1.1 0:8.0.107-0ubuntu1~24.04.1 0:8.0.107-8.0.7-0ubuntu1~24.04.1 0:8.0.7-0ubuntu1~24.04.1 6.8.0-\d+(-intel) 0:6.8.0-1007 6.8.0-\d+(-raspi) 0:6.8.0-1007 6.8.0-\d+(-ibm|-oem) 0:6.8.0-1008 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1010 6.8.0-\d+(-gcp) 0:6.8.0-1010 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-38 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-38 6.8.0-\d+(-gke) 0:6.8.0-1006 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1009 6.8.0-\d+(-aws) 0:6.8.0-1011 0:10.02.1~dfsg1-0ubuntu7.3 0:2.24.33-4ubuntu1.1 0:3.24.41-4ubuntu1.1 0:2.4.58-1ubuntu8.4 0:3.11.0-1ubuntu0.24.04.1 0:1.0.0-6ubuntu0.1 0:6.6-1ubuntu5.1 1:9.18.28-0ubuntu0.24.04.1 3:29.0.1-0ubuntu1.4 0:0.1.2+24.04 0:24.02.0-1ubuntu9.1 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1008 6.8.0-\d+(-gke) 0:6.8.0-1007 6.8.0-\d+(-raspi) 0:6.8.0-1008 6.8.0-\d+(-ibm|-oem) 0:6.8.0-1009 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1010 6.8.0-\d+(-gcp) 0:6.8.0-1011 6.8.0-\d+(-aws) 0:6.8.0-1012 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-39 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-39 0:8u422-b05-1~24.04 0:11.0.24+8-1ubuntu3~24.04.1 0:17.0.12+7-1ubuntu2~24.04 0:21.0.4+7-1ubuntu2~24.04 0:8.0.39-0ubuntu0.24.04.1 0:3.0.13-0ubuntu3.2 0:4.97-4ubuntu4.1 0:2.63+24.04ubuntu0.1 0:3.12.3-1ubuntu0.1 0:1.0.2-4ubuntu0.24.04.1 0:8.5.0-2ubuntu10.2 2:2.10-21ubuntu0.1 3:4.2.11-1ubuntu1.2 0:1.20.1-6ubuntu2.1 6.8.0-\d+(-gke) 0:6.8.0-1008 6.8.0-\d+(-ibm) 0:6.8.0-1010 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1011 6.8.0-\d+(-gcp) 0:6.8.0-1012 6.8.0-\d+(-aws) 0:6.8.0-1013 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-40 6.8.0-\d+(-raspi) 0:6.8.0-1009 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-40 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1010 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1011 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1012 6.8.0-\d+(-oem) 0:6.8.0-1010 0:8.0.108-0ubuntu1~24.04.1 0:8.0.108-8.0.8-0ubuntu1~24.04.1 0:8.0.8-0ubuntu1~24.04.1 1:1.36.1-6ubuntu3.1 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 4:24.2.5-0ubuntu0.24.04.2 0:46.0-0ubuntu6~24.04.3 1:0.4.38-1ubuntu0.1 0:3.20240813.0ubuntu0.24.04.2 0:16.4-0ubuntu0.24.04.1 0:1.2.26+ds1-1ubuntu0.1 6.8.0-\d+(-gke) 0:6.8.0-1009 6.8.0-\d+(-raspi) 0:6.8.0-1010 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1011 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1012 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1012 6.8.0-\d+(-gcp) 0:6.8.0-1013 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1013 6.8.0-\d+(-aws) 0:6.8.0-1014 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-41 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-41 1:8.2.2+ds-0ubuntu1.2 1:2.3.21+dfsg1-2ubuntu6 7:6.1.1-3ubuntu5+esm2 1:1.8.7-1ubuntu0.1.24.04.1 0:3.0.13-0ubuntu3.4 3:4.2.11-1ubuntu1.3 0:24.3.0-1ubuntu0.1 1:24.1.1-0ubuntu1.2 0:0.20180824+1.9.0-2ubuntu0.1~esm2 0:1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 0:1.9.0-2ubuntu0.1~esm2 0:3.9.1-1ubuntu0.1 2:9.1.0016-1ubuntu7.2 0:2.44.3-0ubuntu0.24.04.1 0:4.5.1+git230720-4ubuntu2.2 0:1.19.2-1ubuntu3.2 6.8.0-\d+(-gke) 0:6.8.0-1010 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1012 6.8.0-\d+(-gcp) 0:6.8.0-1014 6.8.0-\d+(-aws) 0:6.8.0-1015 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-44 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-44 6.8.0-\d+(-raspi) 0:6.8.0-1011 0:2.6.1-2ubuntu0.1 0:1.2-4.1ubuntu2.24.0.4.1+esm1 0:68.1.2-2ubuntu1.1 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1014 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1013 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1013 0:3.6.7-9.1ubuntu0.1~esm1 0:1.0.7+dfsg-0ubuntu0.24.04.1 0:8.5.0-2ubuntu10.4 0:1.24.0-2ubuntu7.1 0:3.12.3-1ubuntu0.2 0:8.4.4-1.1ubuntu6.2 6.8.0-\d+(-gke) 0:6.8.0-1011 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1013 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1014 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1014 6.8.0-\d+(-gcp) 0:6.8.0-1015 6.8.0-\d+(-aws) 0:6.8.0-1016 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-45 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-45 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1015 6.8.0-\d+(-raspi) 0:6.8.0-1012 1:29.3+1-1ubuntu2+esm1 0:6.4.2-4ubuntu4.3 0:9.0.70-2ubuntu0.1 0:3.20240910.0ubuntu0.24.04.1 0:2.5.0-2ubuntu0.1 0:1.7.2-3.1ubuntu0.1 0:2.4.7-1.2ubuntu7.3 0:2.0.0-0ubuntu10.1 0:2.0.0-0ubuntu10.2 0:2.0.0-0ubuntu7.1 2:2.0.0-0ubuntu4.1 0:0.9.0-1ubuntu0.1 0:1.14.6-1ubuntu0.1 2:9.1.0016-1ubuntu7.3 0:8.3.6-0ubuntu0.24.04.2 0:2.10.1-2ubuntu0.1 0:6.0-28ubuntu4.1 0:3.2.5+dfsg-3~ubuntu24.04.1 0:1.8.1-1ubuntu0.1 0:8.0.10-0ubuntu1~24.04.1 0:8.0.110-0ubuntu1~24.04.1 0:8.0.110-8.0.10-0ubuntu1~24.04.1 0:2.6.11-2.1ubuntu0.1 0:1.14.51-2ubuntu0.1 0:1.11ubuntu0.1 0:7.2-2ubuntu0.1 0:3.7.2-2ubuntu0.2 6.8.0-\d+(-raspi) 0:6.8.0-1013 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1014 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1015 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1015 6.8.0-\d+(-gcp) 0:6.8.0-1016 6.8.0-\d+(-aws) 0:6.8.0-1017 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-47 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-47 6.8.0-\d+(-gke) 0:6.8.0-1012 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1016 0:3.20231019.1ubuntu2.1 0:2.46.1-0ubuntu0.24.04.1 0:1.19.2-1ubuntu3.3 0:1.22.2-2ubuntu0.3 0:1.17.6-1ubuntu4.1 0:2.5.0-2ubuntu0.2 0:2.0.7-1ubuntu0.1 0:24.0+dfsg-1ubuntu1.1 2:21.1.12-1ubuntu1.1 2:23.2.6-1ubuntu0.1 0:3.7.2-2ubuntu0.3 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-48 6.8.0-\d+(-ibm) 0:6.8.0-1014 6.8.0-\d+(-ibm) 0:6.8.0-1015 6.8.0-\d+(-azure|-azure-fde|-gcp) 0:6.8.0-1016 6.8.0-\d+(-gcp) 0:6.8.0-1017 6.8.0-\d+(-azure) 0:6.8.0-1017 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1015 6.8.0-\d+(-aws) 0:6.8.0-1018 6.8.0-\d+(-oem) 0:6.8.0-1016 6.8.0-\d+(-raspi) 0:6.8.0-1014 6.8.0-\d+(-gke) 0:6.8.0-1013 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-48 0:3.2.3-1ubuntu0.24.04.3 0:1.32.5-1ubuntu1.1 0:3.0.1-3ubuntu0.2 1:8.2.2+ds-0ubuntu1.4 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1017 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1017 0:8u432-ga~us1-0ubuntu2~24.04 0:8u442-b06~us1-0ubuntu1~24.04 0:11.0.25+9-1ubuntu1~24.04 0:17.0.13+11-2ubuntu1~24.04 0:21.0.5+11-1ubuntu1~24.04 0:8.0.40-0ubuntu0.24.04.1 0:10.02.1~dfsg1-0ubuntu7.4 0:8.5.0-2ubuntu10.5 0:2.10.1-2ubuntu0.1+esm1 0:2.46.3-0ubuntu0.24.04.1 0:2.80.0-6ubuntu3.2 0:2.1.2-2ubuntu0.1~esm1 0:3.12.3-1ubuntu0.3 0:1.35-1ubuntu0.24.04.1 0:3.6-7ubuntu4.3 0:3.6-7ubuntu4.4 0:3.6-7ubuntu4.5 6.8.0-\d+(-gke) 0:6.8.0-1014 6.8.0-\d+(-raspi) 0:6.8.0-1015 6.8.0-\d+(-ibm) 0:6.8.0-1016 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1016 6.8.0-\d+(-oem) 0:6.8.0-1017 6.8.0-\d+(-gcp|-nvidia|-nvidia-64k) 0:6.8.0-1018 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1018 6.8.0-\d+(-aws) 0:6.8.0-1019 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-49 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1018 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-49 0:1.1.0+dfsg2-7.2ubuntu0.1~esm1 0:2.74.3-6ubuntu1.1 0:3.4.4-5ubuntu0.1 0:2.45.0-1ubuntu0.2+esm1 2:9.1.0016-1ubuntu7.5 0:16.6-0ubuntu0.24.04.1 0:2.8.5-1ubuntu3.2 3:4.2.11-1ubuntu1.4 0:1.31-3ubuntu3.24.04.1 0:2.46.4-0ubuntu0.24.04.1 0:2.6.1-2ubuntu0.2 0:1.3.2-5ubuntu0.24.04.1~esm1 0:3.20241112.0ubuntu0.24.04.1 0:6.4.0-1ubuntu0.1 0:1.31-3ubuntu3.24.04.2 6.8.0-\d+(-gke) 0:6.8.0-1015 6.8.0-\d+(-raspi) 0:6.8.0-1016 6.8.0-\d+(-ibm) 0:6.8.0-1017 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1017 6.8.0-\d+(-oem) 0:6.8.0-1018 6.8.0-\d+(-gcp) 0:6.8.0-1019 6.8.0-\d+(-aws) 0:6.8.0-1020 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-50 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-50 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1019 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1019 6.8.0-\d+(-gkeop) 0:6.8.0-1002 0:8.3.6-0ubuntu0.24.04.3 0:3.1.48-1ubuntu0.24.04.1 0:26.1.3-0ubuntu1~24.04.1+esm1 0:20.10.25+dfsg1-2ubuntu1+esm1 0:8.5.0-2ubuntu10.6 0:4.3.30-2ubuntu0.24.04.1~esm1 6.8.0-\d+(-gkeop) 0:6.8.0-1003 6.8.0-\d+(-gke) 0:6.8.0-1016 6.8.0-\d+(-raspi) 0:6.8.0-1017 6.8.0-\d+(-ibm) 0:6.8.0-1018 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1018 6.8.0-\d+(-oem) 0:6.8.0-1019 6.8.0-\d+(-gcp|-nvidia|-nvidia-64k) 0:6.8.0-1020 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1020 6.8.0-\d+(-aws) 0:6.8.0-1021 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-51 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-51 6.11.0-\d+(-oem) 0:6.11.0-1010 0:1.24.2-1ubuntu0.1 0:1.24.2-1ubuntu0.2 0:1.24.2-1ubuntu1.1 0:23.11-1ubuntu0.1 0:19.2.0-0ubuntu0.24.04.2 6.11.0-\d+(-oem) 0:6.11.0-1011 0:1.11.1-3ubuntu0.1 0:1.00-2ubuntu0.24.04.1 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1020 0:0.14.3~24.04ubuntu0.1 1:0.21.0+dfsg-1ubuntu0.1~esm1 0:1.2-4.1ubuntu2.24.0.4.1+esm2 0:2.46.5-0ubuntu0.24.04.1 0:20231103+dfsg1-1ubuntu0.1~esm1 3:4.2.11-1ubuntu1.5 0:3.2.7-1ubuntu1.1 0:3.2.7-1ubuntu1.2 1:2.43.0-1ubuntu7.2 0:8.0.112-0ubuntu1~24.04.1 0:8.0.112-8.0.12-0ubuntu1~24.04.1 0:8.0.12-0ubuntu1~24.04.1 0:24.02.0-1ubuntu9.2 0:4.66.2-2ubuntu0.1~esm1 0:3.12.3-1ubuntu0.4 2:9.1.0016-1ubuntu7.6 6.11.0-\d+(-oem) 0:6.11.0-1012 0:2.5.0-2ubuntu0.3 0:3.8.2-1ubuntu0.1~esm1 0:1.9.17-1ubuntu0.1~esm1 0:1.14.0+dfsg-1ubuntu0.1~esm1 4:0.9+LibO24.2.7-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.2 4:102.12+LibO24.2.7-0ubuntu0.24.04.2 4:24.2.7-0ubuntu0.24.04.2 0:1.0.8+dfsg-0ubuntu0.24.04.1 0:8.4.4-1.1ubuntu6.3 0:4.4.4-1ubuntu0.1~esm1 6.8.0-\d+(-gkeop) 0:6.8.0-1004 6.8.0-\d+(-gke) 0:6.8.0-1017 6.8.0-\d+(-raspi) 0:6.8.0-1018 6.8.0-\d+(-ibm) 0:6.8.0-1019 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1019 6.8.0-\d+(-gcp|-nvidia|-nvidia-64k) 0:6.8.0-1021 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1021 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1021 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-52 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-52 6.8.0-\d+(-oem) 0:6.8.0-1020 6.11.0-\d+(-oem) 0:6.11.0-1013 0:2.9.14+dfsg-1.3ubuntu3.1 1:9.18.30-0ubuntu0.24.04.2 0:3.0.20-3ubuntu0.1~esm1 0:3.1.2-1ubuntu1.2 0:8.0.41-0ubuntu0.24.04.1 0:11.0.26+4-1ubuntu1~24.04 0:17.0.14+7-1~24.04 0:21.0.6+7-1~24.04.1 0:1.20.1-6ubuntu2.3 0:4.22.1+dfsg1-2ubuntu0.24.04.1~esm1 0:2.39-0ubuntu8.4 0:3.7.7-1ubuntu0.1~esm1 2:9.1.0016-1ubuntu7.7 0:1.2.2-1ubuntu5.24.04.1 0:3.20250211.0ubuntu0.24.04.1 1:9.6p1-3ubuntu13.8 0:20.25.0+ds-2ubuntu0.1~esm1 0:6.4.5+dfsg-3ubuntu3+esm1 0:4.19.0-3ubuntu0.24.04.1 0:3.0.13-0ubuntu3.5 0:2.46.6-0ubuntu0.24.04.1 0:3.12.3-1ubuntu0.5 0:3.8.3-1.1ubuntu3.3 1:4.1.48-9ubuntu0.1~esm1 0:1.24.0-2ubuntu7.3 0:4.1-7ubuntu0.1 1:2.66-5ubuntu2.2 0:1.3.8.b+dfsg-1ubuntu0.1 2:21.1.12-1ubuntu1.2 2:23.2.6-1ubuntu0.4 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-54 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-54 0:2.9.14+dfsg-1.3ubuntu3.2 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1022 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1022 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1020 6.8.0-\d+(-raspi) 0:6.8.0-1019 6.8.0-\d+(-gkeop) 0:6.8.0-1006 6.8.0-\d+(-gke) 0:6.8.0-1019 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1024 0:2.42-4ubuntu2.4 0:1.2-4.1ubuntu2.24.0.4.1+esm3 0:1.15.0-1ubuntu0.24.04.1 6.11.0-\d+(-oem) 0:6.11.0-1015 6.8.0-\d+(-aws) 0:6.8.0-1023 0:10.2.0+dfsg-1ubuntu0.24.04.1~esm1 1:25.3.2.8+dfsg-1ubuntu4.1 0:1.20.1-6ubuntu2.5 0:16.8-0ubuntu0.24.04.1 0:2.0.16-3ubuntu0.1 2:2.10-21ubuntu0.2 0:0.29.0.gfm.6-6ubuntu0.24.04.1~esm1 0:2.2.1+dfsg1-3.1ubuntu0.1~esm2 5:7.0.15-1ubuntu0.24.04.1 6.11.0-\d+(-oem) 0:6.11.0-1016 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-19 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-55 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-55 6.8.0-\d+(-raspi) 0:6.8.0-1020 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1021 6.8.0-\d+(-aws) 0:6.8.0-1024 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1023 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1023 6.8.0-\d+(-gkeop) 0:6.8.0-1007 6.8.0-\d+(-gke) 0:6.8.0-1020 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1025 3:4.2.11-1ubuntu1.6 0:6.2.7-1+deb11u1build0.24.04.1 4:0.9+LibO24.2.7-0ubuntu0.24.04.3 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.3 4:102.12+LibO24.2.7-0ubuntu0.24.04.3 4:24.2.7-0ubuntu0.24.04.3 0:2.11.5+dfsg1-1ubuntu0.1~esm1 0:3.1.2-1ubuntu1.3 0:8.0.114-0ubuntu1~24.04.1 0:8.0.114-8.0.14-0ubuntu1~24.04.1 0:8.0.14-0ubuntu1~24.04.1 0:0.25.0~rc1-1ubuntu0.1~esm1 0:3.1.18~ds-1ubuntu0.1~esm1 0:3.6.2-2ubuntu0.24.04.1~esm1 1:1.2020.2+ds-3ubuntu1.1 0:2.1.0-1ubuntu0.24.04.1 0:6.2-1ubuntu0.24.04.1~esm1 0:0.9.7+dfsg-2ubuntu0.1~esm1 0:1.1.39-0exp1ubuntu0.24.04.1 0:7.2.8+dfsg1-0ubuntu0.24.04.2 0:1.1.39-0exp1ubuntu0.24.04.2 0:2.6.0-1ubuntu0.24.04.1~esm1 0:0.6.12-2ubuntu0.24.04.1 0:3.2.1-4.1ubuntu0.24.04.1 0:2.2.7-1ubuntu0.2 0:0.2.42-2ubuntu0.24.04.1~esm1 0:0.190-1.1ubuntu0.1 0:45+dfsg-1ubuntu0.1~esm1 0:2.11.5+dfsg1-1ubuntu0.1~esm2 0:4.97-4ubuntu4.3 0:1.6.24~ds1-1ubuntu1.2+esm1 0:1.7.24-0ubuntu1~24.04.2 0:9.6.10+dfsg-1ubuntu0.1~esm1 1:10.11.11-0ubuntu0.24.04.2 0:4.3.1-1ubuntu0.24.04.1 0:10.02.1~dfsg1-0ubuntu7.5 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-21 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-21 6.11.0-\d+(-lowlatency|-lowlatency-64k) 0:6.11.0-1011 6.11.0-\d+(-oem) 0:6.11.0-1017 6.8.0-\d+(-gkeop) 0:6.8.0-1008 6.8.0-\d+(-gke) 0:6.8.0-1021 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1022 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1024 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1024 6.8.0-\d+(-aws) 0:6.8.0-1025 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1026 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-56 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-56 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-56 6.8.1-\d+(-realtime) 0:6.8.1-1018 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1025 6.8.0-\d+(-ibm) 0:6.8.0-1022 6.8.0-\d+(-oem) 0:6.8.0-1024 0:2.48.0-0ubuntu0.24.04.1 0:24.03.2-0ubuntu0.24.04.2 0:1.2.20-8.1ubuntu0.24.04.1 0:3.12.1-1ubuntu1.2 0:8.3.6-0ubuntu0.24.04.4 6.8.0-\d+(-gkeop) 0:6.8.0-1009 6.8.0-\d+(-gke) 0:6.8.0-1022 6.8.0-\d+(-ibm) 0:6.8.0-1023 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1023 6.8.0-\d+(-oem) 0:6.8.0-1025 6.8.0-\d+(-aws) 0:6.8.0-1026 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1027 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-57 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-57 6.8.1-\d+(-realtime) 0:6.8.1-1019 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1025 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1025 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1026 0:1.15.0-1ubuntu0.24.04.1+esm1 0:2.6.12-0ubuntu0.24.04.3 0:2.4.4-2ubuntu17.2 0:5.6.1+really5.4.5-1ubuntu0.2 0:3.2.3-1ubuntu0.24.04.5 2:9.1.0016-1ubuntu7.8 0:2.42-4ubuntu2.5 0:2.6.1-2ubuntu0.3 1:25.3.2.8+dfsg-1ubuntu4.2 0:24.02.0-1ubuntu9.3 0:8.0.115-0ubuntu1~24.04.1 0:8.0.115-8.0.15-0ubuntu1~24.04.1 0:8.0.15-0ubuntu1~24.04.1 0:2.8.5-1ubuntu3.3 0:2.74.3-6ubuntu1.2 0:3.4.4-5ubuntu0.2 0:1.4+really1.3.42-1.1ubuntu0.1~esm1 0:5.38.2-3.2ubuntu0.1 0:3.21.12-8.2ubuntu0.1 0:2.48.1-0ubuntu0.24.04.1 0:3.2.1+dfsg-1ubuntu0.24.04.1~esm1 0:23.01+dfsg-11ubuntu0.1~esm1 0:2021.03.27-1ubuntu0.1~esm1 0:2.0.18-1ubuntu0.1~esm1 1:25.3.2.8+dfsg-1ubuntu4.3 6.11.0-\d+(-lowlatency|-lowlatency-64k) 0:6.11.0-1012 6.11.0-\d+(-oem) 0:6.11.0-1020 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-24 0:2.4.15.1-1ubuntu0.1 0:42.1-2ubuntu0.24.04.1 0:42.2-1ubuntu0.24.04.1 6.11.0-\d+(-azure|-azure-fde) 0:6.11.0-1013 6.8.0-\d+(-ibm) 0:6.8.0-1024 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1024 6.8.0-\d+(-oem) 0:6.8.0-1026 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1026 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1026 6.8.0-\d+(-aws) 0:6.8.0-1027 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1027 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-58 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-58 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-58 6.8.0-\d+(-gkeop) 0:6.8.0-1010 6.8.0-\d+(-gke) 0:6.8.0-1023 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1028 6.8.1-\d+(-realtime) 0:6.8.1-1020 0:3.7.2-2ubuntu0.4 0:3.8.0-2ubuntu0.1~esm1 1:9.6p1-3ubuntu13.11 0:6.4.12-2.2ubuntu1+esm1 0:2.9.14+dfsg-1.3ubuntu3.3 6.8.0-\d+(-azure-nvidia) 0:6.8.0-1014 0:24.02.0-1ubuntu9.4 0:1.22.1+ds-1ubuntu0.24.04.1~esm1 0:10.02.1~dfsg1-0ubuntu7.6 0:20.10.25+dfsg1-2ubuntu1+esm2 0:2.11.1-1ubuntu0.1~esm2 0:3.1.7-1ubuntu3.1 0:8.0.42-0ubuntu0.24.04.1 0:8u452-ga~us1-0ubuntu1~24.04 0:11.0.27+6~us1-0ubuntu1~24.04 0:17.0.15+6~us1-0ubuntu1~24.04 0:21.0.7+6~us1-0ubuntu1~24.04 0:0.21.2-2.1ubuntu0.24.04.1 0:2.4.2-2.1ubuntu0.24.04.1 6.11.0-\d+(-lowlatency|-lowlatency-64k) 0:6.11.0-1013 6.11.0-\d+(-gcp|-gcp-64k) 0:6.11.0-1014 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-25 0:2.74.3-6ubuntu1.3 0:2.74.3-6ubuntu1.4 0:3.4.4-5ubuntu0.3 6.11.0-\d+(-oem) 0:6.11.0-1021 6.8.0-\d+(-gkeop) 0:6.8.0-1011 6.8.0-\d+(-gke) 0:6.8.0-1024 6.8.0-\d+(-ibm) 0:6.8.0-1025 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1025 6.8.0-\d+(-oem) 0:6.8.0-1027 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1027 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1027 6.8.0-\d+(-aws) 0:6.8.0-1028 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1029 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-59 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-59 6.8.1-\d+(-realtime) 0:6.8.1-1021 6.8.0-\d+(-raspi) 0:6.8.0-1024 0:1.3.2-2ubuntu0.24.04.1~esm1 6.11.0-\d+(-azure|-azure-fde) 0:6.11.0-1014 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1028 3:4.2.11-1ubuntu1.7 0:0.14.0-1ubuntu0.24.04.1 4:0.9+LibO24.2.7-0ubuntu0.24.04.4 4:1.2.0+LibO24.2.7-0ubuntu0.24.04.4 4:102.12+LibO24.2.7-0ubuntu0.24.04.4 4:24.2.7-0ubuntu0.24.04.4 0:20220623.1-3.1ubuntu3.2 0:2.2.7-1ubuntu0.3 2:12.4.5-1~ubuntu0.24.04.2 0:8.0.116-0ubuntu1~24.04.1 0:8.0.116-8.0.16-0ubuntu1~24.04.1 0:8.0.16-0ubuntu1~24.04.1 6.8.0-\d+(-ibm) 0:6.8.0-1026 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1026 6.8.0-\d+(-aws) 0:6.8.0-1029 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-60 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-60 6.8.1-\d+(-realtime) 0:6.8.1-1022 6.8.0-\d+(-oem) 0:6.8.0-1028 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1029 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1028 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1028 6.8.0-\d+(-gke) 0:6.8.0-1025 6.8.0-\d+(-gkeop) 0:6.8.0-1012 6.8.0-\d+(-gcp|-gcp-64k) 0:6.8.0-1030 0:16.9-0ubuntu0.24.04.1 6.11.0-\d+(-azure|-azure-fde|-gcp|-gcp-64k) 0:6.11.0-1015 6.11.0-\d+(-oem) 0:6.11.0-1022 6.11.0-\d+(-generic|-generic-64k) 0:6.11.0-26 6.11.0-\d+(-lowlatency|-lowlatency-64k) 0:6.11.0-1014 6.8.0-\d+(-azure-nvidia) 0:6.8.0-1016 6.8.0-\d+(-raspi-realtime) 0:6.8.0-2023 6.8.0-\d+(-raspi) 0:6.8.0-1028 0:10.1.16-1ubuntu0.1~esm1 0:9.0.70-2ubuntu0.1+esm1 0:3.45.1-1ubuntu2.3 0:2.80.0-6ubuntu3.4 0:3.20250512.0ubuntu0.24.04.1 2:7.0-2ubuntu0.1 0:2.10-0.1ubuntu4.1 0:2.10-0.1ubuntu4.4 7:6.1.1-3ubuntu5+esm3 0:1.20.1-6ubuntu2.6 0:2.74.3-6ubuntu1.5 0:3.4.4-5ubuntu0.4 0:68.1.2-2ubuntu1.2 0:2.28.1-0ubuntu3.6 0:2.28.1-0ubuntu3.7 0:6.4.0-1ubuntu0.2 1:10.11.13-0ubuntu0.24.04.1 0:3.8.0-2ubuntu1 0:1.14.0-1ubuntu2.2 3:4.2.11-1ubuntu1.8 0:1.009~3.4.1+dfsg-3+deb12u1build0.24.04.1 0:3.4.1+dfsg-3+deb12u1build0.24.04.1 0:4.6.1+dfsg1-4+deb12u1build0.24.04.1 0:1.24.2-1ubuntu4+esm1 0:255.4-1ubuntu8.8 0:3.20250311.1ubuntu0.24.04.1 0:10.1.16-1ubuntu0.1~esm2 0:9.0.70-2ubuntu0.1+esm2 0 104 0 105 0 106 0 107 0 108 0 109 0 110 0 111 0 112 libssl3t64 libssl-dev openssl libssl-doc python3-cryptography python-cryptography-doc libodbc2 unixodbc-dev unixodbc-common unixodbc odbcinst libodbcinst2 libodbccr2 libcurl4-gnutls-dev libcurl4-openssl-dev libcurl3t64-gnutls libcurl4-doc curl libcurl4t64 apache2-data libapache2-mod-md apache2-utils apache2-dev apache2-suexec-pristine apache2-suexec-custom apache2 apache2-doc libapache2-mod-proxy-uwsgi apache2-ssl-dev apache2-bin libgnutls-openssl27t64 libgnutls-dane0t64 libgnutls28-dev gnutls-doc libgnutls30t64 gnutls-bin libvirt-clients-qemu libvirt-dev libvirt-wireshark libvirt-daemon-driver-qemu libvirt-login-shell libvirt-daemon-system-sysv libvirt-daemon-driver-lxc libnss-libvirt libvirt-daemon libvirt-daemon-config-nwfilter libvirt-daemon-driver-storage-iscsi-direct libvirt-daemon-config-network libvirt-l10n libvirt-clients libvirt-daemon-driver-storage-zfs libvirt-daemon-driver-xen libvirt-daemon-driver-vbox libvirt-daemon-driver-storage-gluster libvirt-daemon-system libvirt0 libvirt-daemon-system-systemd libvirt-sanlock libvirt-daemon-driver-storage-rbd libvirt-doc klibc-utils libklibc libklibc-dev libc-bin glibc-doc locales-all libc6-i386 libc6-s390 libc6-dev-i386 libc6-dev-s390 libc6-dev libc6-amd64 libc6-x32 libc6-dev-amd64 libc-dev-bin libc6 nscd libc-devtools glibc-source libc6-dev-x32 locales python3-pil.imagetk python-pil-doc python3-pil google-guest-agent google-osconfig-agent libnghttp2-14 libnghttp2-doc libnghttp2-dev nghttp2-proxy nghttp2 nghttp2-client nghttp2-server less libwinpr3-dev libfreerdp-server3-3 winpr3-utils libfreerdp-shadow3-3 freerdp3-dev freerdp3-shadow-x11 libfreerdp3-3 libfreerdp-client3-3 freerdp3-wayland libwinpr-tools3-3 libfreerdp-shadow-subsystem3-3 freerdp3-x11 libwinpr3-3 anope libvirt-clients-qemu libvirt-dev libvirt-wireshark libvirt-daemon-driver-qemu libvirt-login-shell libvirt-daemon-system-sysv libvirt-daemon-driver-lxc libnss-libvirt libvirt-daemon libvirt-daemon-config-nwfilter libvirt-daemon-driver-storage-iscsi-direct libvirt-daemon-config-network libvirt-l10n libvirt-clients libvirt-daemon-driver-storage-zfs libvirt-daemon-driver-xen libvirt-daemon-driver-vbox libvirt-daemon-driver-storage-gluster libvirt-daemon-system libvirt0 libvirt-daemon-system-systemd libvirt-sanlock libvirt-daemon-driver-storage-rbd libvirt-doc gir1.2-glib-2.0 libgirepository-2.0-dev gir1.2-girepository-3.0-dev libglib2.0-0t64 libglib2.0-tests gir1.2-glib-2.0-dev libgirepository-2.0-0 gir1.2-girepository-3.0 libglib2.0-data libglib2.0-doc libglib2.0-bin libglib2.0-dev libglib2.0-dev-bin fossil python-sqlparse-doc python3-sqlparse sqlformat dotnet-sdk-8.0 netstandard-targeting-pack-2.1-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 dotnet8 aspnetcore-runtime-8.0 dotnet-apphost-pack-8.0 dotnet-hostfxr-8.0 aspnetcore-runtime-dbg-8.0 dotnet-runtime-dbg-8.0 dotnet-runtime-8.0 dotnet-host-8.0 aspnetcore-targeting-pack-8.0 dotnet-targeting-pack-8.0 python3-idna libcjson-dev libcjson1 gnome-remote-desktop python-jinja2-doc python3-jinja2 gir1.2-javascriptcoregtk-4.1 libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-bin libwebkitgtk-doc gir1.2-webkit2-4.1 libwebkitgtk-6.0-dev libjavascriptcoregtk-4.1-0 libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkit2gtk-4.0-doc libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-dev gir1.2-javascriptcoregtk-6.0 webkit2gtk-driver libjavascriptcoregtk-4.0-bin libwebkitgtk-6.0-4 gir1.2-webkit-6.0 libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol libreoffice-evolution libreoffice-help-en-gb libreoffice-librelogo libreoffice-l10n-ml libreoffice-help-zh-cn libreoffice-subsequentcheckbase libreoffice-l10n-mk libreoffice-help-id libreoffice-l10n-mr libreoffice-style-tango libreoffice-help-pt-br libreofficekit-data libreoffice-core libreoffice-help-it libreoffice-l10n-uk libreoffice-l10n-fr libreoffice-gnome libreoffice-l10n-fi libreoffice-help-nl libreoffice-uiconfig-math libreoffice-l10n-uz libreoffice libreoffice-sdbc-mysql libreoffice-l10n-nb libreoffice-l10n-mn libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-uiconfig-writer libreoffice-l10n-nn libreoffice-help-fi libreoffice-l10n-dz libreoffice-l10n-nr libreoffice-help-fr libreoffice-report-builder-bin libofficebean-java libreoffice-qt6 libreoffice-l10n-vi libreoffice-l10n-nso libreoffice-qt5 libreoffice-nogui libreoffice-math-nogui libreoffice-style-karasa-jaga libreoffice-l10n-ve libreoffice-l10n-gu libreoffice-help-om libreoffice-l10n-gl python3-access2base libreoffice-help-en-us libreoffice-l10n-ga libuno-cppu3t64 liblibreofficekitgtk libreoffice-l10n-gd libreoffice-help-km libreoffice-l10n-kn libreoffice-help-ko libreoffice-l10n-st libreoffice-dev-common libreoffice-l10n-sr libreoffice-help-cs libreoffice-l10n-ts libreoffice-l10n-sv libreoffice-script-provider-bsh gir1.2-lokdocview-0.1 ure-java libreoffice-report-builder-bin-nogui libreoffice-l10n-ka libreoffice-uiconfig-common libridl-java libreoffice-help-ca libreoffice-l10n-zh-tw libreoffice-l10n-sl libreoffice-l10n-sk libreoffice-style-breeze libreoffice-l10n-si libreoffice-l10n-da libreofficekit-dev libreoffice-l10n-de libreoffice-common libreoffice-help-pl libreoffice-l10n-pa-in libuno-purpenvhelpergcc3-3t64 libreoffice-uiconfig-report-builder libreoffice-help-pt libreoffice-base-nogui libreoffice-gtk3 libreoffice-math libreoffice-help-vi libreoffice-gtk4 libreoffice-l10n-tr libreoffice-help-hi libreoffice-l10n-gug libreoffice-sdbc-hsqldb libreoffice-draw-nogui libreoffice-calc libreoffice-base-drivers libreoffice-style-colibre libreoffice-l10n-ta libreoffice-sdbc-firebird libreoffice-l10n-tg libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-id libreoffice-l10n-lv libreoffice-help-hu libreoffice-l10n-lt libreoffice-l10n-ss libunoloader-java libreoffice-uiconfig-impress libreoffice-l10n-eu libreoffice-l10n-et libreoffice-script-provider-js libreoffice-l10n-es libreoffice-l10n-el libreoffice-l10n-eo libreoffice-style-sifr libreoffice-l10n-zh-cn libreoffice-l10n-ug libreoffice-smoketest-data libreoffice-l10n-ko libreoffice-l10n-zu libreoffice-impress libreoffice-java-common libreoffice-help-eu libreoffice-help-et libreoffice-help-es libreoffice-l10n-km libreoffice-uiconfig-draw libreoffice-help-el libreoffice-uiconfig-calc libreoffice-l10n-kk libreoffice-dev-gui libreoffice-l10n-be libreoffice-l10n-szl libreoffice-l10n-bg libreoffice-l10n-tn libreoffice-l10n-bn libreoffice-plasma libreoffice-help-ja libreoffice-l10n-br libreoffice-l10n-bs liblibreoffice-java libunoil-java libreoffice-style-yaru libreoffice-base-core libreoffice-help-ru libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-is libreoffice-style-elementary python3-uno libreoffice-l10n-fa libreoffice-l10n-am libreoffice-l10n-ro libreoffice-l10n-en-za libreoffice-style-sukapura libreoffice-l10n-ca libreoffice-help-sl libreoffice-calc-nogui libreoffice-help-sk libreoffice-help-sv libreoffice-l10n-cs python3-scriptforge libreoffice-dev-doc libreoffice-help-common libreoffice-l10n-za libreoffice-l10n-cy libreoffice-l10n-oc libjurt-java libreoffice-base libreoffice-help-gl libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pt-br libreoffice-l10n-kmr uno-libs-private libreoffice-l10n-ast libreoffice-l10n-hu libreoffice-l10n-hr libreoffice-script-provider-python libreoffice-writer-nogui libreoffice-l10n-hy libreoffice-l10n-he libreoffice-officebean libreoffice-dev libreoffice-report-builder libuno-sal3t64 libreoffice-help-tr libreoffice-l10n-hi libreoffice-kf5 libreoffice-help-dz libreoffice-l10n-pt libreoffice-l10n-ja libreoffice-l10n-pl libreoffice-sdbc-postgresql libreoffice-writer libreoffice-help-de libreoffice-help-da libreoffice-uiconfig-base ure libreoffice-impress-nogui libjuh-java libreoffice-l10n-it libreoffice-l10n-xh libreoffice-l10n-af libuno-cppuhelpergcc3-3t64 libreoffice-help-zh-tw libreoffice-l10n-en-gb libreoffice-draw libuno-salhelpergcc3-3t64 libreoffice-core-nogui libreoffice-l10n-as libreoffice-l10n-ar libreoffice-l10n-in amavisd-new-postfix amavisd-new unbound python3-unbound libunbound8 unbound-anchor unbound-host libunbound-dev git gitweb git-gui git-daemon-sysvinit gitk git-all git-mediawiki git-daemon-run git-man git-doc git-svn git-cvs git-email frr frr-rpki-rtrlib frr-snmp frr-doc frr-pythontools libtss2-esys-3.0.2-0t64 libtss2-sys1t64 libtss2-mu-4.0.1-0t64 libtss2-tcti-spi-helper0t64 libtss2-tcti-libtpms0t64 libtss2-doc libtss2-tcti-swtpm0t64 libtss2-tcti-device0t64 libtss2-rc0t64 libtss2-fapi1t64 libtss2-tcti-mssim0t64 libtss2-policy0t64 libtss2-tcti-pcap0t64 libtss2-tctildr0t64 libtss2-dev libtss2-tcti-cmd0t64 intel-microcode gstreamer1.0-plugins-base libgstreamer-plugins-base1.0-0 gstreamer1.0-x libgstreamer-gl1.0-0 gstreamer1.0-gl libgstreamer-plugins-base1.0-dev gir1.2-gst-plugins-base-1.0 gstreamer1.0-alsa gstreamer1.0-plugins-base-apps python3-werkzeug python-werkzeug-doc python3-pymysql python-pymysql-doc postgresql-server-dev-16 libecpg6 postgresql-pltcl-16 libpq-dev postgresql-16 libpgtypes3 libecpg-dev postgresql-plperl-16 libpq5 postgresql-client-16 postgresql-doc-16 postgresql-plpython3-16 libecpg-compat3 ffmpeg ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra60 libavcodec60 libavdevice-dev libavdevice60 libavfilter-dev libavfilter-extra libavfilter-extra9 libavfilter9 libavformat-dev libavformat-extra libavformat-extra60 libavformat60 libavutil-dev libavutil58 libpostproc-dev libpostproc57 libswresample-dev libswresample4 libswscale-dev libswscale7 libc-bin glibc-doc libc6-i386 libc6-s390 libc6-dev-i386 nscd libc6-dev-x32 libc6-dev libc6-amd64 libc6-x32 libc6-dev-amd64 libc-dev-bin libc6 locales-all libc-devtools glibc-source libc6-dev-s390 locales libarchive-dev libarchive13t64 libarchive-tools libgdk-pixbuf-2.0-dev gdk-pixbuf-tests libgdk-pixbuf2.0-common libgdk-pixbuf2.0-bin libgdk-pixbuf2.0-doc gir1.2-gdkpixbuf-2.0 libgdk-pixbuf-2.0-0 openjdk-8-doc openjdk-8-jdk openjdk-8-jre-headless openjdk-8-jre openjdk-8-jdk-headless openjdk-8-source openjdk-8-jre-zero openjdk-8-demo libvpx-dev libvpx9 libvpx-doc vpx-tools libaom-doc libaom-dev libaom3 aom-tools 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: mysql-client libmysqlclient-dev mysql-testsuite-8.0 mysql-router mysql-server libmysqlclient21 mysql-client-core-8.0 mysql-server-core-8.0 mysql-server-8.0 mysql-testsuite mysql-client-8.0 mysql-source-8.0 libtiff-opengl libtiff5-dev libtiff-dev libtiffxx6 libtiff6 libtiff-tools libtiff-doc libndp0 libndp-dev libndp-tools virtuoso-vad-demo virtuoso-vad-sparqldemo virtuoso-vad-rdfmappers virtuoso-vsp-startpage virtuoso-vad-isparql virtuoso-opensource-7-bin virtuoso-server virtuoso-vad-tutorial virtuoso-minimal virtuoso-opensource virtuoso-vad-ods virtuoso-opensource-7 virtuoso-vad-syncml virtuoso-vad-doc virtuoso-vad-conductor libvirtodbc0 libvirtuoso5.5-cil virtuoso-vad-bpel virtuoso-opensource-7-common libvte-2.91-gtk4-dev libvte-2.91-common gir1.2-vte-3.91 gir1.2-vte-2.91 libvte-2.91-doc libvte-2.91-gtk4-0 libvte-2.91-0 libvte-2.91-gtk4-doc libvte-2.91-dev ghostscript libgs10-common libgs10 libgs-common libgs-dev ghostscript-doc libsss-certmap-dev libipa-hbac-dev sssd-ad libsss-sudo libsss-nss-idmap0 libnss-sss sssd-ipa sssd-passkey libipa-hbac0t64 libsss-idmap-dev python3-libsss-nss-idmap sssd-common python3-sss libpam-sss sssd libsss-idmap0 sssd-idp libsss-nss-idmap-dev sssd-kcm libsss-certmap0 python3-libipa-hbac sssd-ldap sssd-tools sssd-ad-common sssd-krb5-common sssd-dbus sssd-krb5 sssd-proxy ruby-rack ruby3.2 ruby3.2-doc ruby3.2-dev libruby3.2 mariadb-plugin-provider-lzo mariadb-plugin-cracklib-password-check mariadb-backup mariadb-plugin-connect mariadb-plugin-spider libmariadb-dev libmariadb3 mariadb-plugin-s3 mariadb-plugin-provider-bzip2 mariadb-plugin-provider-lzma mariadb-plugin-provider-snappy mariadb-client libmariadbd19t64 mariadb-server-core mariadb-server-10.5 mariadb-test-data mariadb-plugin-provider-lz4 mariadb-client-core mariadb-plugin-rocksdb mariadb-plugin-gssapi-client mariadb-plugin-mroonga libmariadbd-dev libmariadb-dev-compat mariadb-plugin-gssapi-server mariadb-server mariadb-common mariadb-plugin-hashicorp-key-management mariadb-plugin-oqgraph mariadb-test php8.3-cgi php8.3-xsl php8.3-fpm php8.3-phpdbg php8.3-zip php8.3-curl php8.3-ldap php8.3-gmp php8.3-sqlite3 php8.3-gd php8.3-common php8.3-enchant php8.3-odbc php8.3-cli php8.3-mbstring php8.3-pgsql php8.3-mysql php8.3-dba libapache2-mod-php8.3 php8.3-soap php8.3-opcache php8.3-sybase php8.3-pspell libphp8.3-embed php8.3-bz2 php8.3-dev php8.3 php8.3-tidy php8.3-interbase php8.3-readline php8.3-intl php8.3-imap php8.3-xml php8.3-bcmath php8.3-snmp plasma-workspace-dev libweather-ion7 libkfontinst5 libcolorcorrect5 libkworkspace5-5 plasma-workspace-data plasma-workspace-wayland sddm-theme-breeze libplasma-geolocation-interface5 libnotificationmanager1 libkfontinstui5 libtaskmanager6 plasma-workspace libcups2-dev cups-bsd cups-common cups-core-drivers cups-server-common cups-client libcupsimage2t64 libcupsimage2-dev cups-ipp-utils cups-ppdc cups libcups2t64 cups-daemon libcups2-dev cups-bsd cups-common cups-core-drivers cups-server-common cups-client libcupsimage2t64 libcupsimage2-dev cups-ipp-utils cups-ppdc cups libcups2t64 cups-daemon netplan.io netplan-generator libnetplan1 python3-netplan libnetplan-dev netplan.io netplan-generator libnetplan1 python3-netplan libnetplan-dev wget libiso9660-dev libiso9660-11t64 libcdio-utils libcdio19t64 libiso9660++0t64 libudf-dev libcdio++1t64 libiso9660++-dev libudf0t64 libcdio++-dev libcdio-dev openssh-client openssh-server ssh-askpass-gnome ssh openssh-tests openssh-sftp-server openvpn 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol libreoffice-evolution libreoffice-help-en-gb libreoffice-librelogo libreoffice-l10n-ml libreoffice-help-zh-cn libreoffice-subsequentcheckbase libreoffice-l10n-mk libreoffice-help-id libreoffice-l10n-mr libreoffice-style-tango libreoffice-help-pt-br libreofficekit-data libreoffice-core libreoffice-help-it libreoffice-l10n-uk libreoffice-l10n-fr libreoffice-gnome libreoffice-l10n-fi libreoffice-help-nl libreoffice-uiconfig-math libreoffice-l10n-uz libreoffice libreoffice-sdbc-mysql libreoffice-l10n-nb libreoffice-l10n-mn libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-uiconfig-writer libreoffice-l10n-nn libreoffice-help-fi libreoffice-l10n-dz libreoffice-l10n-nr libreoffice-help-fr libreoffice-report-builder-bin libofficebean-java libreoffice-qt6 libreoffice-l10n-vi libreoffice-l10n-nso libreoffice-qt5 libreoffice-nogui libreoffice-math-nogui libreoffice-style-karasa-jaga libreoffice-l10n-ve libreoffice-l10n-gu libreoffice-help-om libreoffice-l10n-gl python3-access2base libreoffice-help-en-us libreoffice-l10n-ga libuno-cppu3t64 liblibreofficekitgtk libreoffice-l10n-gd libreoffice-help-km libreoffice-l10n-kn libreoffice-help-ko libreoffice-l10n-st libreoffice-dev-common libreoffice-l10n-sr libreoffice-help-cs libreoffice-l10n-ts libreoffice-l10n-sv libreoffice-script-provider-bsh gir1.2-lokdocview-0.1 ure-java libreoffice-report-builder-bin-nogui libreoffice-l10n-ka libreoffice-uiconfig-common libridl-java libreoffice-help-ca libreoffice-l10n-zh-tw libreoffice-l10n-sl libreoffice-l10n-sk libreoffice-style-breeze libreoffice-l10n-si libreoffice-l10n-da libreofficekit-dev libreoffice-l10n-de libreoffice-common libreoffice-help-pl libreoffice-l10n-pa-in libuno-purpenvhelpergcc3-3t64 libreoffice-uiconfig-report-builder libreoffice-help-pt libreoffice-base-nogui libreoffice-gtk3 libreoffice-math libreoffice-help-vi libreoffice-gtk4 libreoffice-l10n-tr libreoffice-help-hi libreoffice-l10n-gug libreoffice-sdbc-hsqldb libreoffice-draw-nogui libreoffice-calc libreoffice-base-drivers libreoffice-style-colibre libreoffice-l10n-ta libreoffice-sdbc-firebird libreoffice-l10n-tg libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-id libreoffice-l10n-lv libreoffice-help-hu libreoffice-l10n-lt libreoffice-l10n-ss libunoloader-java libreoffice-uiconfig-impress libreoffice-l10n-eu libreoffice-l10n-et libreoffice-script-provider-js libreoffice-l10n-es libreoffice-l10n-el libreoffice-l10n-eo libreoffice-style-sifr libreoffice-l10n-zh-cn libreoffice-l10n-ug libreoffice-smoketest-data libreoffice-l10n-ko libreoffice-l10n-zu libreoffice-impress libreoffice-java-common libreoffice-help-eu libreoffice-help-et libreoffice-help-es libreoffice-l10n-km libreoffice-uiconfig-draw libreoffice-help-el libreoffice-uiconfig-calc libreoffice-l10n-kk libreoffice-dev-gui libreoffice-l10n-be libreoffice-l10n-szl libreoffice-l10n-bg libreoffice-l10n-tn libreoffice-l10n-bn libreoffice-plasma libreoffice-help-ja libreoffice-l10n-br libreoffice-l10n-bs liblibreoffice-java libunoil-java libreoffice-style-yaru libreoffice-base-core libreoffice-help-ru libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-is libreoffice-style-elementary python3-uno libreoffice-l10n-fa libreoffice-l10n-am libreoffice-l10n-ro libreoffice-l10n-en-za libreoffice-style-sukapura libreoffice-l10n-ca libreoffice-help-sl libreoffice-calc-nogui libreoffice-help-sk libreoffice-help-sv libreoffice-l10n-cs python3-scriptforge libreoffice-dev-doc libreoffice-help-common libreoffice-l10n-za libreoffice-l10n-cy libreoffice-l10n-oc libjurt-java libreoffice-base libreoffice-help-gl libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pt-br libreoffice-l10n-kmr uno-libs-private libreoffice-l10n-ast libreoffice-l10n-hu libreoffice-l10n-hr libreoffice-script-provider-python libreoffice-writer-nogui libreoffice-l10n-hy libreoffice-l10n-he libreoffice-officebean libreoffice-dev libreoffice-report-builder libuno-sal3t64 libreoffice-help-tr libreoffice-l10n-hi libreoffice-kf5 libreoffice-help-dz libreoffice-l10n-pt libreoffice-l10n-ja libreoffice-l10n-pl libreoffice-sdbc-postgresql libreoffice-writer libreoffice-help-de libreoffice-help-da libreoffice-uiconfig-base ure libreoffice-impress-nogui libjuh-java libreoffice-l10n-it libreoffice-l10n-xh libreoffice-l10n-af libuno-cppuhelpergcc3-3t64 libreoffice-help-zh-tw libreoffice-l10n-en-gb libreoffice-draw libuno-salhelpergcc3-3t64 libreoffice-core-nogui libreoffice-l10n-as libreoffice-l10n-ar libreoffice-l10n-in 0: libvirtodbc0 libvirtuoso5.5-cil virtuoso-minimal virtuoso-opensource virtuoso-opensource-7 virtuoso-opensource-7-bin virtuoso-opensource-7-common virtuoso-server virtuoso-vad-bpel virtuoso-vad-conductor virtuoso-vad-demo virtuoso-vad-doc virtuoso-vad-isparql virtuoso-vad-ods virtuoso-vad-rdfmappers virtuoso-vad-sparqldemo virtuoso-vad-syncml virtuoso-vad-tutorial virtuoso-vsp-startpage cinder-api cinder-backup cinder-common cinder-scheduler cinder-volume python3-cinder cinder-api cinder-backup cinder-common cinder-scheduler cinder-volume python3-cinder glance glance-api glance-common python-glance-doc python3-glance nova-ajax-console-proxy nova-api nova-api-metadata nova-api-os-compute nova-api-os-volume nova-cells nova-common nova-compute nova-compute-ironic nova-compute-kvm nova-compute-libvirt nova-compute-lxc nova-compute-qemu nova-compute-vmware nova-compute-xen nova-conductor nova-doc nova-novncproxy nova-scheduler nova-serialproxy nova-spiceproxy nova-volume python3-nova apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi golang-1.21 golang-1.21-doc golang-1.21-go golang-1.21-src golang-1.22 golang-1.22-doc golang-1.22-go golang-1.22-src openssh-client openssh-server openssh-sftp-server openssh-tests ssh ssh-askpass-gnome python-django-doc python3-django dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: ghostscript ghostscript-doc libgs-common libgs-dev libgs10 libgs10-common gir1.2-gtk-2.0 gtk2-engines-pixbuf libgail-common libgail-dev libgail-doc libgail18t64 libgtk2.0-0t64 libgtk2.0-bin libgtk2.0-common libgtk2.0-dev libgtk2.0-doc gir1.2-gtk-3.0 gtk-3-examples gtk-update-icon-cache libgail-3-0t64 libgail-3-dev libgail-3-doc libgtk-3-0t64 libgtk-3-bin libgtk-3-common libgtk-3-dev libgtk-3-doc apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi python-pymongo-doc python3-bson python3-bson-ext python3-gridfs python3-pymongo python3-pymongo-ext python3-zipp squid squid-cgi squid-common squid-openssl squid-purge squidclient bind9 bind9-dev bind9-dnsutils bind9-doc bind9-host bind9-libs bind9-utils bind9utils dnsutils nova-ajax-console-proxy nova-api nova-api-metadata nova-api-os-compute nova-api-os-volume nova-cells nova-common nova-compute nova-compute-ironic nova-compute-kvm nova-compute-libvirt nova-compute-lxc nova-compute-qemu nova-compute-vmware nova-compute-xen nova-conductor nova-doc nova-novncproxy nova-scheduler nova-serialproxy nova-spiceproxy nova-volume python3-nova provd gir1.2-poppler-0.18 libpoppler-cpp-dev libpoppler-cpp0t64 libpoppler-dev libpoppler-glib-dev libpoppler-glib-doc libpoppler-glib8t64 libpoppler-private-dev libpoppler-qt5-1t64 libpoppler-qt5-dev libpoppler-qt6-3t64 libpoppler-qt6-dev libpoppler134 poppler-utils 0: 0: 0: 0: 0: 0: 0: 0: 0: openjdk-8-demo openjdk-8-doc openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless openjdk-8-jre-zero openjdk-8-source openjdk-11-demo openjdk-11-doc openjdk-11-jdk openjdk-11-jdk-headless openjdk-11-jre openjdk-11-jre-headless openjdk-11-jre-zero openjdk-11-source openjdk-17-demo openjdk-17-doc openjdk-17-jdk openjdk-17-jdk-headless openjdk-17-jre openjdk-17-jre-headless openjdk-17-jre-zero openjdk-17-source openjdk-21-demo openjdk-21-doc openjdk-21-jdk openjdk-21-jdk-headless openjdk-21-jre openjdk-21-jre-headless openjdk-21-jre-zero openjdk-21-source openjdk-21-testsupport libmysqlclient-dev libmysqlclient21 mysql-client mysql-client-8.0 mysql-client-core-8.0 mysql-router mysql-server mysql-server-8.0 mysql-server-core-8.0 mysql-source-8.0 mysql-testsuite mysql-testsuite-8.0 libssl-dev libssl-doc libssl3t64 openssl exim4 exim4-base exim4-config exim4-daemon-heavy exim4-daemon-light exim4-dev eximon4 golang-github-snapcore-snapd-dev golang-github-ubuntu-core-snappy-dev snap-confine snapd snapd-xdg-open ubuntu-core-launcher ubuntu-core-snapd-units ubuntu-snappy ubuntu-snappy-cli idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv gross curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 eapoltest hostapd libwpa-client-dev wpagui wpasupplicant python-django-doc python3-django krb5-admin-server krb5-doc krb5-gss-samples krb5-k5tls krb5-kdc krb5-kdc-ldap krb5-kpropd krb5-locales krb5-multidev krb5-otp krb5-pkinit krb5-user libgssapi-krb5-2 libgssrpc4t64 libk5crypto3 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 libkrad-dev libkrad0 libkrb5-3 libkrb5-dev libkrb5support0 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 busybox busybox-initramfs busybox-static busybox-syslogd udhcpc udhcpd libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol gir1.2-lokdocview-0.1 libjuh-java libjurt-java liblibreoffice-java liblibreofficekitgtk libofficebean-java libreoffice libreoffice-base libreoffice-base-core libreoffice-base-drivers libreoffice-base-nogui libreoffice-calc libreoffice-calc-nogui libreoffice-common libreoffice-core libreoffice-core-nogui libreoffice-dev libreoffice-dev-common libreoffice-dev-doc libreoffice-dev-gui libreoffice-draw libreoffice-draw-nogui libreoffice-evolution libreoffice-gnome libreoffice-gtk3 libreoffice-gtk4 libreoffice-help-ca libreoffice-help-common libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-en-us libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-id libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-vi libreoffice-help-zh-cn libreoffice-help-zh-tw libreoffice-impress libreoffice-impress-nogui libreoffice-java-common libreoffice-kf5 libreoffice-l10n-af libreoffice-l10n-am libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gd libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-gug libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-hy libreoffice-l10n-id libreoffice-l10n-in libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-kk libreoffice-l10n-km libreoffice-l10n-kmr libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mn libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-szl libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-za libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-librelogo libreoffice-math libreoffice-math-nogui libreoffice-nogui libreoffice-officebean libreoffice-plasma libreoffice-qt5 libreoffice-qt6 libreoffice-report-builder libreoffice-report-builder-bin libreoffice-report-builder-bin-nogui libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-script-provider-python libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb libreoffice-sdbc-mysql libreoffice-sdbc-postgresql libreoffice-smoketest-data libreoffice-style-breeze libreoffice-style-colibre libreoffice-style-elementary libreoffice-style-karasa-jaga libreoffice-style-sifr libreoffice-style-sukapura libreoffice-style-tango libreoffice-style-yaru libreoffice-subsequentcheckbase libreoffice-uiconfig-base libreoffice-uiconfig-calc libreoffice-uiconfig-common libreoffice-uiconfig-draw libreoffice-uiconfig-impress libreoffice-uiconfig-math libreoffice-uiconfig-report-builder libreoffice-uiconfig-writer libreoffice-writer libreoffice-writer-nogui libreofficekit-data libreofficekit-dev libridl-java libuno-cppu3t64 libuno-cppuhelpergcc3-3t64 libuno-purpenvhelpergcc3-3t64 libuno-sal3t64 libuno-salhelpergcc3-3t64 libunoil-java libunoloader-java python3-access2base python3-scriptforge python3-uno uno-libs-private ure ure-java gnome-shell gnome-shell-common gnome-shell-extension-prefs liborc-0.4-0t64 liborc-0.4-dev liborc-0.4-dev-bin liborc-0.4-doc intel-microcode libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq5 postgresql-16 postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 postgresql-server-dev-16 cacti 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: qemu-block-extra qemu-block-supplemental qemu-guest-agent qemu-system qemu-system-arm qemu-system-common qemu-system-data qemu-system-gui qemu-system-mips qemu-system-misc qemu-system-modules-opengl qemu-system-modules-spice qemu-system-ppc qemu-system-s390x qemu-system-sparc qemu-system-x86 qemu-system-x86-xen qemu-system-xen qemu-user qemu-user-binfmt qemu-user-static qemu-utils dovecot-auth-lua dovecot-core dovecot-dev dovecot-gssapi dovecot-imapd dovecot-ldap dovecot-lmtpd dovecot-managesieved dovecot-mysql dovecot-pgsql dovecot-pop3d dovecot-sieve dovecot-solr dovecot-sqlite dovecot-submissiond ffmpeg ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra60 libavcodec60 libavdevice-dev libavdevice60 libavfilter-dev libavfilter-extra libavfilter-extra9 libavfilter9 libavformat-dev libavformat-extra libavformat-extra60 libavformat60 libavutil-dev libavutil58 libpostproc-dev libpostproc57 libswresample-dev libswresample4 libswscale-dev libswscale7 python-webob-doc python3-webob libssl-dev libssl-doc libssl3t64 openssl python-django-doc python3-django python3-twisted twisted-doc ironic-api ironic-common ironic-conductor python3-ironic znc-backlog znc-push znc znc-dev znc-perl znc-python znc-tcl python-aiohttp-doc python3-aiohttp vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver libtiff-dev libtiff-doc libtiff-opengl libtiff-tools libtiff5-dev libtiff6 libtiffxx6 libunbound-dev libunbound8 python3-unbound unbound unbound-anchor unbound-host 0: 0: 0: 0: 0: 0: 0: expat libexpat1 libexpat1-dev libxmltok1-dev libxmltok1t64 python-setuptools-doc python3-pkg-resources python3-setuptools python3-setuptools-whl 0: 0: 0: dcmtk dcmtk-doc libdcmtk-dev libdcmtk17t64 clamav clamav-base clamav-daemon clamav-docs clamav-freshclam clamav-milter clamav-testfiles clamdscan libclamav-dev libclamav11t64 curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 libnginx-mod-http-geoip libnginx-mod-http-image-filter libnginx-mod-http-perl libnginx-mod-http-xslt-filter libnginx-mod-mail libnginx-mod-stream libnginx-mod-stream-geoip nginx nginx-common nginx-core nginx-dev nginx-doc nginx-extras nginx-full nginx-light idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv frr frr-doc frr-pythontools frr-rpki-rtrlib frr-snmp 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: emacs emacs-bin-common emacs-common emacs-el emacs-gtk emacs-lucid emacs-nox emacs-pgtk puma libtomcat9-java intel-microcode libopenjp2-7 libopenjp2-7-dev libopenjp2-tools libopenjpip-dec-server libopenjpip-server libopenjpip-viewer libopenjpip7 openjpeg-doc libapr1-dev libapr1t64 cups cups-bsd cups-client cups-common cups-core-drivers cups-daemon cups-ipp-utils cups-ppdc cups-server-common libcups2-dev libcups2t64 libcupsimage2-dev libcupsimage2t64 cups-browsed cups-browsed-tests cups-browsed cups-browsed-tests libcupsfilters-dev libcupsfilters-tests libcupsfilters2-common libcupsfilters2t64 libppd-dev libppd-tests libppd-utils libppd2 libppd2-common ppdc bubblewrap flatpak flatpak-tests gir1.2-flatpak-1.0 libflatpak-dev libflatpak-doc libflatpak0 vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd libapache2-mod-php8.3 libphp8.3-embed php8.3 php8.3-bcmath php8.3-bz2 php8.3-cgi php8.3-cli php8.3-common php8.3-curl php8.3-dba php8.3-dev php8.3-enchant php8.3-fpm php8.3-gd php8.3-gmp php8.3-imap php8.3-interbase php8.3-intl php8.3-ldap php8.3-mbstring php8.3-mysql php8.3-odbc php8.3-opcache php8.3-pgsql php8.3-phpdbg php8.3-pspell php8.3-readline php8.3-snmp php8.3-soap php8.3-sqlite3 php8.3-sybase php8.3-tidy php8.3-xml php8.3-xsl php8.3-zip python-asyncssh-doc python3-asyncssh unzip freeradius freeradius-common freeradius-config freeradius-dhcp freeradius-iodbc freeradius-krb5 freeradius-ldap freeradius-memcached freeradius-mysql freeradius-postgresql freeradius-python3 freeradius-redis freeradius-rest freeradius-utils freeradius-yubikey libfreeradius-dev libfreeradius3 ruby-webrick aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 liboath-dev liboath0t64 libpam-oath libpskc-dev libpskc0t64 oathtool pskctool gir1.2-gsf-1 libgsf-1-114 libgsf-1-common libgsf-1-dev libgsf-bin ubuntu-advantage-desktop-daemon nano nano-tiny libarchive-dev libarchive-tools libarchive13t64 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: amd64-microcode gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver libunbound-dev libunbound8 python3-unbound unbound unbound-anchor unbound-host golang-1.22 golang-1.22-doc golang-1.22-go golang-1.22-src heif-gdk-pixbuf heif-thumbnailer libheif-dev libheif-examples libheif-plugin-aomdec libheif-plugin-aomenc libheif-plugin-dav1d libheif-plugin-ffmpegdec libheif-plugin-j2kdec libheif-plugin-j2kenc libheif-plugin-jpegdec libheif-plugin-jpegenc libheif-plugin-libde265 libheif-plugin-rav1e libheif-plugin-svtenc libheif-plugin-x265 libheif1 libopenjp2-7 libopenjp2-7-dev libopenjp2-tools libopenjpip-dec-server libopenjpip-server libopenjpip-viewer libopenjpip7 openjpeg-doc python3-urllib3 python3-pip python3-pip-whl xnest xorg-server-source xserver-common xserver-xephyr xserver-xorg-core xserver-xorg-dev xserver-xorg-legacy xvfb xwayland libarchive-dev libarchive-tools libarchive13t64 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libruby3.2 ruby3.2 ruby3.2-dev ruby3.2-doc libmpg123-0t64 libmpg123-dev libout123-0t64 libsyn123-0t64 mpg123 python-werkzeug-doc python3-werkzeug qemu-block-extra qemu-block-supplemental qemu-guest-agent qemu-system qemu-system-arm qemu-system-common qemu-system-data qemu-system-gui qemu-system-mips qemu-system-misc qemu-system-modules-opengl qemu-system-modules-spice qemu-system-ppc qemu-system-s390x qemu-system-sparc qemu-system-x86 qemu-system-x86-xen qemu-system-xen qemu-user qemu-user-binfmt qemu-user-static qemu-utils 0: 0: openjdk-8-demo openjdk-8-doc openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless openjdk-8-jre-zero openjdk-8-source openjdk-8-demo openjdk-8-doc openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless openjdk-8-jre-zero openjdk-8-source openjdk-11-demo openjdk-11-doc openjdk-11-jdk openjdk-11-jdk-headless openjdk-11-jre openjdk-11-jre-headless openjdk-11-jre-zero openjdk-11-source openjdk-17-demo openjdk-17-doc openjdk-17-jdk openjdk-17-jdk-headless openjdk-17-jre openjdk-17-jre-headless openjdk-17-jre-zero openjdk-17-source openjdk-21-demo openjdk-21-doc openjdk-21-jdk openjdk-21-jdk-headless openjdk-21-jre openjdk-21-jre-headless openjdk-21-jre-zero openjdk-21-source openjdk-21-testsupport libmysqlclient-dev libmysqlclient21 mysql-client mysql-client-8.0 mysql-client-core-8.0 mysql-router mysql-server mysql-server-8.0 mysql-server-core-8.0 mysql-source-8.0 mysql-testsuite mysql-testsuite-8.0 ghostscript ghostscript-doc libgs-common libgs-dev libgs10 libgs10-common curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 python-asyncssh-doc python3-asyncssh gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver gir1.2-girepository-3.0 gir1.2-girepository-3.0-dev gir1.2-glib-2.0 gir1.2-glib-2.0-dev libgirepository-2.0-0 libgirepository-2.0-dev libglib2.0-0t64 libglib2.0-bin libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libglib2.0-doc libglib2.0-tests python-waitress-doc python3-waitress idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv libmodule-scandeps-perl needrestart needrestart needrestart 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: rapidjson-dev rapidjson-doc gir1.2-soup-2.4 libsoup-2.4-1 libsoup-gnome-2.4-1 libsoup-gnome2.4-dev libsoup2.4-common libsoup2.4-dev libsoup2.4-doc libsoup2.4-tests gir1.2-soup-3.0 libsoup-3.0-0 libsoup-3.0-common libsoup-3.0-dev libsoup-3.0-doc libsoup-3.0-tests gh vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq5 postgresql-16 postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 postgresql-server-dev-16 haproxy haproxy-doc vim-haproxy python-django-doc python3-django ofono ofono-dev ofono-scripts gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver expat libexpat1 libexpat1-dev libshiro-java intel-microcode python-tornado-doc python3-tornado ofono ofono-dev ofono-scripts 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libapache2-mod-php8.3 libphp8.3-embed php8.3 php8.3-bcmath php8.3-bz2 php8.3-cgi php8.3-cli php8.3-common php8.3-curl php8.3-dba php8.3-dev php8.3-enchant php8.3-fpm php8.3-gd php8.3-gmp php8.3-imap php8.3-interbase php8.3-intl php8.3-ldap php8.3-mbstring php8.3-mysql php8.3-odbc php8.3-opcache php8.3-pgsql php8.3-phpdbg php8.3-pspell php8.3-readline php8.3-snmp php8.3-soap php8.3-sqlite3 php8.3-sybase php8.3-tidy php8.3-xml php8.3-xsl php8.3-zip smarty3 docker-doc docker.io golang-github-docker-docker-dev curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 libspring-aop-java libspring-beans-java libspring-context-java libspring-context-support-java libspring-core-java libspring-expression-java libspring-instrument-java libspring-jdbc-java libspring-jms-java libspring-messaging-java libspring-orm-java libspring-oxm-java libspring-test-java libspring-transaction-java libspring-web-java libspring-web-portlet-java libspring-web-servlet-java 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: gir1.2-gstreamer-1.0 gstreamer1.0-tools libgstreamer1.0-0 libgstreamer1.0-dev gir1.2-gst-plugins-base-1.0 gstreamer1.0-alsa gstreamer1.0-gl gstreamer1.0-plugins-base gstreamer1.0-plugins-base-apps gstreamer1.0-x libgstreamer-gl1.0-0 libgstreamer-plugins-base1.0-0 libgstreamer-plugins-base1.0-dev gstreamer1.0-gtk3 gstreamer1.0-plugins-good gstreamer1.0-pulseaudio gstreamer1.0-qt5 gstreamer1.0-qt6 libgstreamer-plugins-good1.0-0 libgstreamer-plugins-good1.0-dev dpdk dpdk-dev dpdk-doc libdpdk-dev librte-acl24 librte-baseband-acc24 librte-baseband-fpga-5gnr-fec24 librte-baseband-fpga-lte-fec24 librte-baseband-la12xx24 librte-baseband-null24 librte-baseband-turbo-sw24 librte-bbdev24 librte-bitratestats24 librte-bpf24 librte-bus-auxiliary24 librte-bus-cdx24 librte-bus-dpaa24 librte-bus-fslmc24 librte-bus-ifpga24 librte-bus-pci24 librte-bus-platform24 librte-bus-vdev24 librte-bus-vmbus24 librte-cfgfile24 librte-cmdline24 librte-common-cnxk24 librte-common-cpt24 librte-common-dpaax24 librte-common-iavf24 librte-common-idpf24 librte-common-mlx5-24 librte-common-nfp24 librte-common-octeontx24 librte-common-qat24 librte-common-sfc-efx24 librte-compress-isal24 librte-compress-mlx5-24 librte-compress-octeontx24 librte-compress-zlib24 librte-compressdev24 librte-crypto-bcmfs24 librte-crypto-caam-jr24 librte-crypto-ccp24 librte-crypto-cnxk24 librte-crypto-dpaa-sec24 librte-crypto-dpaa2-sec24 librte-crypto-ipsec-mb24 librte-crypto-mlx5-24 librte-crypto-nitrox24 librte-crypto-null24 librte-crypto-octeontx24 librte-crypto-openssl24 librte-crypto-scheduler24 librte-crypto-virtio24 librte-cryptodev24 librte-dispatcher24 librte-distributor24 librte-dma-cnxk24 librte-dma-dpaa2-24 librte-dma-dpaa24 librte-dma-hisilicon24 librte-dma-idxd24 librte-dma-ioat24 librte-dma-skeleton24 librte-dmadev24 librte-eal24 librte-efd24 librte-ethdev24 librte-event-cnxk24 librte-event-dlb2-24 librte-event-dpaa2-24 librte-event-dpaa24 librte-event-dsw24 librte-event-octeontx24 librte-event-opdl24 librte-event-skeleton24 librte-event-sw24 librte-eventdev24 librte-fib24 librte-gpudev24 librte-graph24 librte-gro24 librte-gso24 librte-hash24 librte-ip-frag24 librte-ipsec24 librte-jobstats24 librte-kvargs24 librte-latencystats24 librte-log24 librte-lpm24 librte-mbuf24 librte-member24 librte-mempool-bucket24 librte-mempool-cnxk24 librte-mempool-dpaa2-24 librte-mempool-dpaa24 librte-mempool-octeontx24 librte-mempool-ring24 librte-mempool-stack24 librte-mempool24 librte-meta-all librte-meta-allpmds librte-meta-baseband librte-meta-bus librte-meta-common librte-meta-compress librte-meta-crypto librte-meta-dma librte-meta-event librte-meta-mempool librte-meta-net librte-meta-raw librte-meter24 librte-metrics24 librte-ml-cnxk24 librte-mldev24 librte-net-af-packet24 librte-net-af-xdp24 librte-net-ark24 librte-net-atlantic24 librte-net-avp24 librte-net-axgbe24 librte-net-bnx2x24 librte-net-bnxt24 librte-net-bond24 librte-net-cnxk24 librte-net-cpfl24 librte-net-cxgbe24 librte-net-dpaa2-24 librte-net-dpaa24 librte-net-e1000-24 librte-net-ena24 librte-net-enetc24 librte-net-enetfec24 librte-net-enic24 librte-net-failsafe24 librte-net-fm10k24 librte-net-gve24 librte-net-hinic24 librte-net-hns3-24 librte-net-i40e24 librte-net-iavf24 librte-net-ice24 librte-net-idpf24 librte-net-igc24 librte-net-ionic24 librte-net-ipn3ke24 librte-net-ixgbe24 librte-net-mana24 librte-net-memif24 librte-net-mlx4-24 librte-net-mlx5-24 librte-net-netvsc24 librte-net-nfp24 librte-net-ngbe24 librte-net-null24 librte-net-octeon-ep24 librte-net-octeontx24 librte-net-pcap24 librte-net-pfe24 librte-net-qede24 librte-net-ring24 librte-net-sfc24 librte-net-softnic24 librte-net-tap24 librte-net-thunderx24 librte-net-txgbe24 librte-net-vdev-netvsc24 librte-net-vhost24 librte-net-virtio24 librte-net-vmxnet3-24 librte-net24 librte-node24 librte-pcapng24 librte-pci24 librte-pdcp24 librte-pdump24 librte-pipeline24 librte-port24 librte-power24 librte-raw-cnxk-bphy24 librte-raw-cnxk-gpio24 librte-raw-dpaa2-cmdif24 librte-raw-ifpga24 librte-raw-ntb24 librte-raw-skeleton24 librte-rawdev24 librte-rcu24 librte-regex-cn9k24 librte-regex-mlx5-24 librte-regexdev24 librte-reorder24 librte-rib24 librte-ring24 librte-sched24 librte-security24 librte-stack24 librte-table24 librte-telemetry24 librte-timer24 librte-vdpa-ifc24 librte-vdpa-mlx5-24 librte-vdpa-nfp24 librte-vdpa-sfc24 librte-vhost24 ceph ceph-base ceph-common ceph-fuse ceph-grafana-dashboards ceph-immutable-object-cache ceph-mds ceph-mgr ceph-mgr-cephadm ceph-mgr-dashboard ceph-mgr-diskprediction-local ceph-mgr-k8sevents ceph-mgr-modules-core ceph-mgr-rook ceph-mon ceph-osd ceph-prometheus-alerts ceph-resource-agents ceph-volume cephadm cephfs-mirror cephfs-shell crimson-osd libcephfs-dev libcephfs-java libcephfs-jni libcephfs2 librados-dev librados2 libradospp-dev libradosstriper-dev libradosstriper1 librbd-dev librbd1 librgw-dev librgw2 libsqlite3-mod-ceph libsqlite3-mod-ceph-dev python3-ceph python3-ceph-argparse python3-ceph-common python3-cephfs python3-rados python3-rbd python3-rgw rados-objclass-dev radosgw rbd-fuse rbd-mirror rbd-nbd 0: tinyproxy tinyproxy-bin xfpt 0: adsys adsys-windows golang-golang-x-net-dev libxmltok1-dev libxmltok1t64 gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver neomutt python-django-doc python3-django rsync rsync git git-all git-cvs git-daemon-run git-daemon-sysvinit git-doc git-email git-gui git-man git-mediawiki git-svn gitk gitweb dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 gir1.2-poppler-0.18 libpoppler-cpp-dev libpoppler-cpp0t64 libpoppler-dev libpoppler-glib-dev libpoppler-glib-doc libpoppler-glib8t64 libpoppler-private-dev libpoppler-qt5-1t64 libpoppler-qt5-dev libpoppler-qt6-3t64 libpoppler-qt6-dev libpoppler134 poppler-utils python3-tqdm idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd 0: libopenjp2-7 libopenjp2-7-dev libopenjp2-tools libopenjpip-dec-server libopenjpip-server libopenjpip-viewer libopenjpip7 openjpeg-doc cyrus-admin cyrus-caldav cyrus-clients cyrus-common cyrus-dev cyrus-doc cyrus-imapd cyrus-murder cyrus-nntpd cyrus-pop3d cyrus-replication libcyrus-imap-perl htmldoc htmldoc-common libpcl-apps1.14 libpcl-common1.14 libpcl-dev libpcl-doc libpcl-features1.14 libpcl-filters1.14 libpcl-io1.14 libpcl-kdtree1.14 libpcl-keypoints1.14 libpcl-ml1.14 libpcl-octree1.14 libpcl-outofcore1.14 libpcl-people1.14 libpcl-recognition1.14 libpcl-registration1.14 libpcl-sample-consensus1.14 libpcl-search1.14 libpcl-segmentation1.14 libpcl-stereo1.14 libpcl-surface1.14 libpcl-tracking1.14 libpcl-visualization1.14 pcl-tools libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol gir1.2-lokdocview-0.1 libjuh-java libjurt-java liblibreoffice-java liblibreofficekitgtk libofficebean-java libreoffice libreoffice-base libreoffice-base-core libreoffice-base-drivers libreoffice-base-nogui libreoffice-calc libreoffice-calc-nogui libreoffice-common libreoffice-core libreoffice-core-nogui libreoffice-dev libreoffice-dev-common libreoffice-dev-doc libreoffice-dev-gui libreoffice-draw libreoffice-draw-nogui libreoffice-evolution libreoffice-gnome libreoffice-gtk3 libreoffice-gtk4 libreoffice-help-ca libreoffice-help-common libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-en-us libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-id libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-vi libreoffice-help-zh-cn libreoffice-help-zh-tw libreoffice-impress libreoffice-impress-nogui libreoffice-java-common libreoffice-kf5 libreoffice-l10n-af libreoffice-l10n-am libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gd libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-gug libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-hy libreoffice-l10n-id libreoffice-l10n-in libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-kk libreoffice-l10n-km libreoffice-l10n-kmr libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mn libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-szl libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-za libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-librelogo libreoffice-math libreoffice-math-nogui libreoffice-nogui libreoffice-officebean libreoffice-plasma libreoffice-qt5 libreoffice-qt6 libreoffice-report-builder libreoffice-report-builder-bin libreoffice-report-builder-bin-nogui libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-script-provider-python libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb libreoffice-sdbc-mysql libreoffice-sdbc-postgresql libreoffice-smoketest-data libreoffice-style-breeze libreoffice-style-colibre libreoffice-style-elementary libreoffice-style-karasa-jaga libreoffice-style-sifr libreoffice-style-sukapura libreoffice-style-tango libreoffice-style-yaru libreoffice-subsequentcheckbase libreoffice-uiconfig-base libreoffice-uiconfig-calc libreoffice-uiconfig-common libreoffice-uiconfig-draw libreoffice-uiconfig-impress libreoffice-uiconfig-math libreoffice-uiconfig-report-builder libreoffice-uiconfig-writer libreoffice-writer libreoffice-writer-nogui libreofficekit-data libreofficekit-dev libridl-java libuno-cppu3t64 libuno-cppuhelpergcc3-3t64 libuno-purpenvhelpergcc3-3t64 libuno-sal3t64 libuno-salhelpergcc3-3t64 libunoil-java libunoloader-java python3-access2base python3-scriptforge python3-uno uno-libs-private ure ure-java clamav clamav-base clamav-daemon clamav-docs clamav-freshclam clamav-milter clamav-testfiles clamdscan libclamav-dev libclamav11t64 frr frr-doc frr-pythontools frr-rpki-rtrlib frr-snmp tcpreplay 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libxml2 libxml2-dev libxml2-doc libxml2-utils python3-libxml2 bind9 bind9-dev bind9-dnsutils bind9-doc bind9-host bind9-libs bind9-utils bind9utils dnsutils libvlc-bin libvlc-dev libvlc5 libvlccore-dev libvlccore9 vlc vlc-bin vlc-data vlc-l10n vlc-plugin-access-extra vlc-plugin-base vlc-plugin-fluidsynth vlc-plugin-jack vlc-plugin-notify vlc-plugin-qt vlc-plugin-samba vlc-plugin-skins2 vlc-plugin-svg vlc-plugin-video-output vlc-plugin-video-splitter vlc-plugin-visualization python-jinja2-doc python3-jinja2 libmysqlclient-dev libmysqlclient21 mysql-client mysql-client-8.0 mysql-client-core-8.0 mysql-router mysql-server mysql-server-8.0 mysql-server-core-8.0 mysql-source-8.0 mysql-testsuite mysql-testsuite-8.0 openjdk-11-demo openjdk-11-doc openjdk-11-jdk openjdk-11-jdk-headless openjdk-11-jre openjdk-11-jre-headless openjdk-11-jre-zero openjdk-11-source openjdk-17-demo openjdk-17-doc openjdk-17-jdk openjdk-17-jdk-headless openjdk-17-jre openjdk-17-jre-headless openjdk-17-jre-zero openjdk-17-source openjdk-21-demo openjdk-21-doc openjdk-21-jdk openjdk-21-jdk-headless openjdk-21-jre openjdk-21-jre-headless openjdk-21-jre-zero openjdk-21-source openjdk-21-testsupport krb5-admin-server krb5-doc krb5-gss-samples krb5-k5tls krb5-kdc krb5-kdc-ldap krb5-kpropd krb5-locales krb5-multidev krb5-otp krb5-pkinit krb5-user libgssapi-krb5-2 libgssrpc4t64 libk5crypto3 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 libkrad-dev libkrad0 libkrb5-3 libkrb5-dev libkrb5support0 ckeditor glibc-doc glibc-source libc-bin libc-dev-bin libc-devtools libc6 libc6-amd64 libc6-dev libc6-dev-amd64 libc6-dev-i386 libc6-dev-s390 libc6-dev-x32 libc6-i386 libc6-s390 libc6-x32 locales locales-all nscd openrefine vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd libsndfile1 libsndfile1-dev sndfile-programs intel-microcode openssh-client openssh-server openssh-sftp-server openssh-tests ssh ssh-askpass-gnome python3-virtualenv virtualenv php-symfony php-symfony-all-my-sms-notifier php-symfony-amazon-mailer php-symfony-amazon-sns-notifier php-symfony-amazon-sqs-messenger php-symfony-amqp-messenger php-symfony-asset php-symfony-asset-mapper php-symfony-bandwidth-notifier php-symfony-beanstalkd-messenger php-symfony-brevo-mailer php-symfony-brevo-notifier php-symfony-browser-kit php-symfony-cache php-symfony-chatwork-notifier php-symfony-click-send-notifier php-symfony-clickatell-notifier php-symfony-clock php-symfony-config php-symfony-console php-symfony-contact-everyone-notifier php-symfony-crowdin-translation-provider php-symfony-css-selector php-symfony-debug-bundle php-symfony-dependency-injection php-symfony-discord-notifier php-symfony-doctrine-bridge php-symfony-doctrine-messenger php-symfony-dom-crawler php-symfony-dotenv php-symfony-engagespot-notifier php-symfony-error-handler php-symfony-esendex-notifier php-symfony-event-dispatcher php-symfony-expo-notifier php-symfony-expression-language php-symfony-fake-chat-notifier php-symfony-fake-sms-notifier php-symfony-filesystem php-symfony-finder php-symfony-firebase-notifier php-symfony-form php-symfony-forty-six-elks-notifier php-symfony-framework-bundle php-symfony-free-mobile-notifier php-symfony-gateway-api-notifier php-symfony-gitter-notifier php-symfony-go-ip-notifier php-symfony-google-chat-notifier php-symfony-google-mailer php-symfony-html-sanitizer php-symfony-http-client php-symfony-http-foundation php-symfony-http-kernel php-symfony-infobip-mailer php-symfony-infobip-notifier php-symfony-intl php-symfony-iqsms-notifier php-symfony-isendpro-notifier php-symfony-kaz-info-teh-notifier php-symfony-ldap php-symfony-light-sms-notifier php-symfony-line-notify-notifier php-symfony-linked-in-notifier php-symfony-lock php-symfony-loco-translation-provider php-symfony-lokalise-translation-provider php-symfony-mail-pace-mailer php-symfony-mailchimp-mailer php-symfony-mailer php-symfony-mailer-send-mailer php-symfony-mailgun-mailer php-symfony-mailjet-mailer php-symfony-mailjet-notifier php-symfony-mastodon-notifier php-symfony-mattermost-notifier php-symfony-mercure-notifier php-symfony-message-bird-notifier php-symfony-message-media-notifier php-symfony-messenger php-symfony-microsoft-teams-notifier php-symfony-mime php-symfony-mobyt-notifier php-symfony-monolog-bridge php-symfony-notifier php-symfony-novu-notifier php-symfony-ntfy-notifier php-symfony-octopush-notifier php-symfony-oh-my-smtp-mailer php-symfony-one-signal-notifier php-symfony-options-resolver php-symfony-orange-sms-notifier php-symfony-ovh-cloud-notifier php-symfony-pager-duty-notifier php-symfony-password-hasher php-symfony-phpunit-bridge php-symfony-phrase-translation-provider php-symfony-plivo-notifier php-symfony-postmark-mailer php-symfony-process php-symfony-property-access php-symfony-property-info php-symfony-proxy-manager-bridge php-symfony-psr-http-message-bridge php-symfony-pushover-notifier php-symfony-rate-limiter php-symfony-redis-messenger php-symfony-redlink-notifier php-symfony-remote-event php-symfony-ring-central-notifier php-symfony-rocket-chat-notifier php-symfony-routing php-symfony-runtime php-symfony-scaleway-mailer php-symfony-scheduler php-symfony-security-bundle php-symfony-security-core php-symfony-security-csrf php-symfony-security-http php-symfony-semaphore php-symfony-sendberry-notifier php-symfony-sendgrid-mailer php-symfony-sendinblue-mailer php-symfony-sendinblue-notifier php-symfony-serializer php-symfony-simple-textin-notifier php-symfony-sinch-notifier php-symfony-slack-notifier php-symfony-sms-biuras-notifier php-symfony-sms-factor-notifier php-symfony-sms77-notifier php-symfony-smsapi-notifier php-symfony-smsc-notifier php-symfony-smsmode-notifier php-symfony-spot-hit-notifier php-symfony-stopwatch php-symfony-string php-symfony-telegram-notifier php-symfony-telnyx-notifier php-symfony-templating php-symfony-termii-notifier php-symfony-translation php-symfony-turbo-sms-notifier php-symfony-twig-bridge php-symfony-twig-bundle php-symfony-twilio-notifier php-symfony-twitter-notifier php-symfony-uid php-symfony-validator php-symfony-var-dumper php-symfony-var-exporter php-symfony-vonage-notifier php-symfony-web-link php-symfony-web-profiler-bundle php-symfony-webhook php-symfony-workflow php-symfony-yaml php-symfony-yunpian-notifier php-symfony-zendesk-notifier php-symfony-zulip-notifier libtasn1-6 libtasn1-6-dev libtasn1-bin libtasn1-doc libssl-dev libssl-doc libssl3t64 openssl gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv gnutls-bin gnutls-doc libgnutls-dane0t64 libgnutls-openssl27t64 libgnutls28-dev libgnutls30t64 libnetty-java libnginx-mod-http-geoip libnginx-mod-http-image-filter libnginx-mod-http-perl libnginx-mod-http-xslt-filter libnginx-mod-mail libnginx-mod-stream libnginx-mod-stream-geoip nginx nginx-common nginx-core nginx-dev nginx-doc nginx-extras nginx-full nginx-light libiniparser-dev libiniparser-doc libiniparser1 libcap-dev libcap2 libcap2-bin libpam-cap proftpd-core proftpd-dev proftpd-doc proftpd-mod-crypto proftpd-mod-geoip proftpd-mod-ldap proftpd-mod-mysql proftpd-mod-odbc proftpd-mod-pgsql proftpd-mod-snmp proftpd-mod-sqlite proftpd-mod-wrap xnest xorg-server-source xserver-common xserver-xephyr xserver-xorg-core xserver-xorg-dev xserver-xorg-legacy xvfb xwayland 0: 0: libxml2 libxml2-dev libxml2-doc libxml2-utils python3-libxml2 0: 0: 0: 0: 0: 0: 0: binutils binutils-aarch64-linux-gnu binutils-alpha-linux-gnu binutils-arc-linux-gnu binutils-arm-linux-gnueabi binutils-arm-linux-gnueabihf binutils-common binutils-dev binutils-doc binutils-for-build binutils-for-host binutils-hppa-linux-gnu binutils-hppa64-linux-gnu binutils-i686-gnu binutils-i686-kfreebsd-gnu binutils-i686-linux-gnu binutils-ia64-linux-gnu binutils-loongarch64-linux-gnu binutils-m68k-linux-gnu binutils-multiarch binutils-multiarch-dev binutils-powerpc-linux-gnu binutils-powerpc64-linux-gnu binutils-powerpc64le-linux-gnu binutils-riscv64-linux-gnu binutils-s390x-linux-gnu binutils-sh4-linux-gnu binutils-source binutils-sparc64-linux-gnu binutils-x86-64-gnu binutils-x86-64-kfreebsd-gnu binutils-x86-64-linux-gnu binutils-x86-64-linux-gnux32 libbinutils libctf-nobfd0 libctf0 libgprofng0 libsframe1 libxmltok1-dev libxmltok1t64 ruby-saml 0: 0: opennds opennds-daemon opennds-daemon-common erlang erlang-asn1 erlang-base erlang-common-test erlang-crypto erlang-debugger erlang-dev erlang-dialyzer erlang-diameter erlang-doc erlang-edoc erlang-eldap erlang-erl-docgen erlang-et erlang-eunit erlang-examples erlang-ftp erlang-inets erlang-jinterface erlang-manpages erlang-megaco erlang-mnesia erlang-mode erlang-nox erlang-observer erlang-odbc erlang-os-mon erlang-parsetools erlang-public-key erlang-reltool erlang-runtime-tools erlang-snmp erlang-src erlang-ssh erlang-ssl erlang-syntax-tools erlang-tftp erlang-tools erlang-wx erlang-x11 erlang-xmerl krb5-admin-server krb5-doc krb5-gss-samples krb5-k5tls krb5-kdc krb5-kdc-ldap krb5-kpropd krb5-locales krb5-multidev krb5-otp krb5-pkinit krb5-user libgssapi-krb5-2 libgssrpc4t64 libk5crypto3 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 libkrad-dev libkrad0 libkrb5-3 libkrb5-dev libkrb5support0 libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq5 postgresql-16 postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 postgresql-server-dev-16 libraptor2-0 libraptor2-dev libraptor2-doc raptor2-utils eapoltest hostapd libwpa-client-dev wpagui wpasupplicant cmark-gfm libcmark-gfm-dev libcmark-gfm-extensions-dev libcmark-gfm-extensions0.29.0.gfm.6 libcmark-gfm0.29.0.gfm.6 gpac gpac-modules-base libgpac-dev libgpac12t64 redis redis-sentinel redis-server redis-tools 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: python-django-doc python3-django gnuchess libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol gir1.2-lokdocview-0.1 libjuh-java libjurt-java liblibreoffice-java liblibreofficekitgtk libofficebean-java libreoffice libreoffice-base libreoffice-base-core libreoffice-base-drivers libreoffice-base-nogui libreoffice-calc libreoffice-calc-nogui libreoffice-common libreoffice-core libreoffice-core-nogui libreoffice-dev libreoffice-dev-common libreoffice-dev-doc libreoffice-dev-gui libreoffice-draw libreoffice-draw-nogui libreoffice-evolution libreoffice-gnome libreoffice-gtk3 libreoffice-gtk4 libreoffice-help-ca libreoffice-help-common libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-en-us libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-id libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-vi libreoffice-help-zh-cn libreoffice-help-zh-tw libreoffice-impress libreoffice-impress-nogui libreoffice-java-common libreoffice-kf5 libreoffice-l10n-af libreoffice-l10n-am libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gd libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-gug libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-hy libreoffice-l10n-id libreoffice-l10n-in libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-kk libreoffice-l10n-km libreoffice-l10n-kmr libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mn libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-szl libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-za libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-librelogo libreoffice-math libreoffice-math-nogui libreoffice-nogui libreoffice-officebean libreoffice-plasma libreoffice-qt5 libreoffice-qt6 libreoffice-report-builder libreoffice-report-builder-bin libreoffice-report-builder-bin-nogui libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-script-provider-python libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb libreoffice-sdbc-mysql libreoffice-sdbc-postgresql libreoffice-smoketest-data libreoffice-style-breeze libreoffice-style-colibre libreoffice-style-elementary libreoffice-style-karasa-jaga libreoffice-style-sifr libreoffice-style-sukapura libreoffice-style-tango libreoffice-style-yaru libreoffice-subsequentcheckbase libreoffice-uiconfig-base libreoffice-uiconfig-calc libreoffice-uiconfig-common libreoffice-uiconfig-draw libreoffice-uiconfig-impress libreoffice-uiconfig-math libreoffice-uiconfig-report-builder libreoffice-uiconfig-writer libreoffice-writer libreoffice-writer-nogui libreofficekit-data libreofficekit-dev libridl-java libuno-cppu3t64 libuno-cppuhelpergcc3-3t64 libuno-purpenvhelpergcc3-3t64 libuno-sal3t64 libuno-salhelpergcc3-3t64 libunoil-java libunoloader-java python3-access2base python3-scriptforge python3-uno uno-libs-private ure ure-java freerdp2-dev freerdp2-shadow-x11 freerdp2-wayland freerdp2-x11 libfreerdp-client2-2t64 libfreerdp-server2-2t64 libfreerdp-shadow-subsystem2-2t64 libfreerdp-shadow2-2t64 libfreerdp2-2t64 libuwac0-0t64 libuwac0-dev libwinpr-tools2-2t64 libwinpr2-2t64 libwinpr2-dev winpr-utils python-jinja2-doc python3-jinja2 dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 opensc opensc-pkcs11 netatalk libresteasy-java plantuml python3-djoser python3-restrictedpython liburiparser-dev liburiparser-doc liburiparser1 libxslt1-dev libxslt1.1 xsltproc valkey-redis-compat valkey-sentinel valkey-server valkey-tools libxslt1-dev libxslt1.1 xsltproc golang-github-cli-go-gh-v2-dev libpam-pkcs11 libsaml-dev libsaml-doc libsaml12t64 opensaml-schemas opensaml-tools ruby-rack libzvbi-common libzvbi-dev libzvbi-doc libzvbi0t64 zvbi debuginfod elfutils libasm-dev libasm1t64 libdebuginfod-common libdebuginfod-dev libdebuginfod1t64 libdw-dev libdw1t64 libelf-dev libelf1t64 smartdns freerdp2-dev freerdp2-shadow-x11 freerdp2-wayland freerdp2-x11 libfreerdp-client2-2t64 libfreerdp-server2-2t64 libfreerdp-shadow-subsystem2-2t64 libfreerdp-shadow2-2t64 libfreerdp2-2t64 libuwac0-0t64 libuwac0-dev libwinpr-tools2-2t64 libwinpr2-2t64 libwinpr2-dev winpr-utils exim4 exim4-base exim4-config exim4-daemon-heavy exim4-daemon-light exim4-dev eximon4 golang-github-containerd-containerd-dev containerd elpa-org org-mode libmariadb-dev libmariadb-dev-compat libmariadb3 libmariadbd-dev libmariadbd19t64 mariadb-backup mariadb-client mariadb-client-core mariadb-common mariadb-plugin-connect mariadb-plugin-cracklib-password-check mariadb-plugin-gssapi-client mariadb-plugin-gssapi-server mariadb-plugin-hashicorp-key-management mariadb-plugin-mroonga mariadb-plugin-oqgraph mariadb-plugin-provider-bzip2 mariadb-plugin-provider-lz4 mariadb-plugin-provider-lzma mariadb-plugin-provider-lzo mariadb-plugin-provider-snappy mariadb-plugin-rocksdb mariadb-plugin-s3 mariadb-plugin-spider mariadb-server mariadb-server-10.5 mariadb-server-core mariadb-test mariadb-test-data smarty4 ghostscript ghostscript-doc libgs-common libgs-dev libgs10 libgs10-common 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver ovn-central ovn-common ovn-controller-vtep ovn-doc ovn-docker ovn-host ovn-ic ovn-ic-db libtar-dev libtar0t64 rabbitmq-server libapache2-mod-php8.3 libphp8.3-embed php8.3 php8.3-bcmath php8.3-bz2 php8.3-cgi php8.3-cli php8.3-common php8.3-curl php8.3-dba php8.3-dev php8.3-enchant php8.3-fpm php8.3-gd php8.3-gmp php8.3-imap php8.3-interbase php8.3-intl php8.3-ldap php8.3-mbstring php8.3-mysql php8.3-odbc php8.3-opcache php8.3-pgsql php8.3-phpdbg php8.3-pspell php8.3-readline php8.3-snmp php8.3-soap php8.3-sqlite3 php8.3-sybase php8.3-tidy php8.3-xml php8.3-xsl php8.3-zip 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: ruby-saml openvpn dirmngr gnupg gnupg-agent gnupg-l10n gnupg-utils gnupg2 gpg gpg-agent gpg-wks-client gpg-wks-server gpgconf gpgsm gpgv gpgv-static gpgv-win32 keyboxd scdaemon liblzma-dev liblzma-doc liblzma5 xz-utils xzdec libruby3.2 ruby3.2 ruby3.2-dev ruby3.2-doc vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd binutils binutils-aarch64-linux-gnu binutils-alpha-linux-gnu binutils-arc-linux-gnu binutils-arm-linux-gnueabi binutils-arm-linux-gnueabihf binutils-common binutils-dev binutils-doc binutils-for-build binutils-for-host binutils-hppa-linux-gnu binutils-hppa64-linux-gnu binutils-i686-gnu binutils-i686-kfreebsd-gnu binutils-i686-linux-gnu binutils-ia64-linux-gnu binutils-loongarch64-linux-gnu binutils-m68k-linux-gnu binutils-multiarch binutils-multiarch-dev binutils-powerpc-linux-gnu binutils-powerpc64-linux-gnu binutils-powerpc64le-linux-gnu binutils-riscv64-linux-gnu binutils-s390x-linux-gnu binutils-sh4-linux-gnu binutils-source binutils-sparc64-linux-gnu binutils-x86-64-gnu binutils-x86-64-kfreebsd-gnu binutils-x86-64-linux-gnu binutils-x86-64-linux-gnux32 libbinutils libctf-nobfd0 libctf0 libgprofng0 libsframe1 expat libexpat1 libexpat1-dev erlang erlang-asn1 erlang-base erlang-common-test erlang-crypto erlang-debugger erlang-dev erlang-dialyzer erlang-diameter erlang-doc erlang-edoc erlang-eldap erlang-erl-docgen erlang-et erlang-eunit erlang-examples erlang-ftp erlang-inets erlang-jinterface erlang-manpages erlang-megaco erlang-mnesia erlang-mode erlang-nox erlang-observer erlang-odbc erlang-os-mon erlang-parsetools erlang-public-key erlang-reltool erlang-runtime-tools erlang-snmp erlang-src erlang-ssh erlang-ssl erlang-syntax-tools erlang-tftp erlang-tools erlang-wx erlang-x11 erlang-xmerl gir1.2-poppler-0.18 libpoppler-cpp-dev libpoppler-cpp0t64 libpoppler-dev libpoppler-glib-dev libpoppler-glib-doc libpoppler-glib8t64 libpoppler-private-dev libpoppler-qt5-1t64 libpoppler-qt5-dev libpoppler-qt6-3t64 libpoppler-qt6-dev libpoppler134 poppler-utils dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 haproxy haproxy-doc vim-haproxy gir1.2-soup-2.4 libsoup-2.4-1 libsoup-gnome-2.4-1 libsoup-gnome2.4-dev libsoup2.4-common libsoup2.4-dev libsoup2.4-doc libsoup2.4-tests gir1.2-soup-3.0 libsoup-3.0-0 libsoup-3.0-common libsoup-3.0-dev libsoup-3.0-doc libsoup-3.0-tests graphicsmagick graphicsmagick-imagemagick-compat graphicsmagick-libmagick-dev-compat libgraphics-magick-perl libgraphicsmagick++-q16-12t64 libgraphicsmagick++1-dev libgraphicsmagick-q16-3t64 libgraphicsmagick1-dev libperl-dev libperl5.38t64 perl perl-base perl-debug perl-doc perl-modules-5.38 elpa-protobuf-mode libprotobuf-dev libprotobuf-java libprotobuf-lite32t64 libprotobuf32t64 libprotoc-dev libprotoc32t64 php-google-protobuf protobuf-compiler python3-protobuf ruby-google-protobuf gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver cimg-dev cimg-doc cimg-examples 7zip 7zip-standalone libquickjs quickjs libmosquitto-dev libmosquitto1 libmosquittopp-dev libmosquittopp1 mosquitto mosquitto-clients mosquitto-dev erlang erlang-asn1 erlang-base erlang-common-test erlang-crypto erlang-debugger erlang-dev erlang-dialyzer erlang-diameter erlang-doc erlang-edoc erlang-eldap erlang-erl-docgen erlang-et erlang-eunit erlang-examples erlang-ftp erlang-inets erlang-jinterface erlang-manpages erlang-megaco erlang-mnesia erlang-mode erlang-nox erlang-observer erlang-odbc erlang-os-mon erlang-parsetools erlang-public-key erlang-reltool erlang-runtime-tools erlang-snmp erlang-src erlang-ssh erlang-ssl erlang-syntax-tools erlang-tftp erlang-tools erlang-wx erlang-x11 erlang-xmerl 0: 0: 0: libapache2-mod-auth-openidc yelp-xsl libyelp-dev libyelp0 yelp 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libarchive-dev libarchive-tools libarchive13t64 php-twig php-twig-cache-extra php-twig-cssinliner-extra php-twig-doc php-twig-extra-bundle php-twig-html-extra php-twig-inky-extra php-twig-intl-extra php-twig-markdown-extra php-twig-string-extra openssh-client openssh-server openssh-sftp-server openssh-tests ssh ssh-askpass-gnome jupyter-notebook python-notebook-doc python3-notebook libxml2 libxml2-dev libxml2-doc libxml2-utils python3-libxml2 0: gir1.2-poppler-0.18 libpoppler-cpp-dev libpoppler-cpp0t64 libpoppler-dev libpoppler-glib-dev libpoppler-glib-doc libpoppler-glib8t64 libpoppler-private-dev libpoppler-qt5-1t64 libpoppler-qt5-dev libpoppler-qt6-3t64 libpoppler-qt6-dev libpoppler134 poppler-utils micropython micropython-doc ghostscript ghostscript-doc libgs-common libgs-dev libgs10 libgs10-common golang-github-docker-docker-dev python-scrapy-doc python3-scrapy corosync corosync-doc corosync-notifyd corosync-vqsim libcfg-dev libcfg7 libcmap-dev libcmap4 libcorosync-common-dev libcorosync-common4 libcpg-dev libcpg4 libquorum-dev libquorum5 libsam-dev libsam4 libvotequorum-dev libvotequorum8 libmysqlclient-dev libmysqlclient21 mysql-client mysql-client-8.0 mysql-client-core-8.0 mysql-router mysql-server mysql-server-8.0 mysql-server-core-8.0 mysql-source-8.0 mysql-testsuite mysql-testsuite-8.0 openjdk-8-demo openjdk-8-doc openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless openjdk-8-jre-zero openjdk-8-source openjdk-11-demo openjdk-11-doc openjdk-11-jdk openjdk-11-jdk-headless openjdk-11-jre openjdk-11-jre-headless openjdk-11-jre-zero openjdk-11-source openjdk-17-demo openjdk-17-doc openjdk-17-jdk openjdk-17-jdk-headless openjdk-17-jre openjdk-17-jre-headless openjdk-17-jre-zero openjdk-17-source openjdk-21-demo openjdk-21-doc openjdk-21-jdk openjdk-21-jdk-headless openjdk-21-jre openjdk-21-jre-headless openjdk-21-jre-zero openjdk-21-source openjdk-21-testsupport libraw-bin libraw-dev libraw-doc libraw23t64 libfcgi-bin libfcgi-dev libfcgi0t64 0: 0: 0: gir1.2-soup-2.4 libsoup-2.4-1 libsoup-gnome-2.4-1 libsoup-gnome2.4-dev libsoup2.4-common libsoup2.4-dev libsoup2.4-doc libsoup2.4-tests gir1.2-soup-2.4 libsoup-2.4-1 libsoup-gnome-2.4-1 libsoup-gnome2.4-dev libsoup2.4-common libsoup2.4-dev libsoup2.4-doc libsoup2.4-tests gir1.2-soup-3.0 libsoup-3.0-0 libsoup-3.0-common libsoup-3.0-dev libsoup-3.0-doc libsoup-3.0-tests 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: ruby-carrierwave 0: 0: python-django-doc python3-django python3-h11 libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol gir1.2-lokdocview-0.1 libjuh-java libjurt-java liblibreoffice-java liblibreofficekitgtk libofficebean-java libreoffice libreoffice-base libreoffice-base-core libreoffice-base-drivers libreoffice-base-nogui libreoffice-calc libreoffice-calc-nogui libreoffice-common libreoffice-core libreoffice-core-nogui libreoffice-dev libreoffice-dev-common libreoffice-dev-doc libreoffice-dev-gui libreoffice-draw libreoffice-draw-nogui libreoffice-evolution libreoffice-gnome libreoffice-gtk3 libreoffice-gtk4 libreoffice-help-ca libreoffice-help-common libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-en-us libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-id libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-vi libreoffice-help-zh-cn libreoffice-help-zh-tw libreoffice-impress libreoffice-impress-nogui libreoffice-java-common libreoffice-kf5 libreoffice-l10n-af libreoffice-l10n-am libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gd libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-gug libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-hy libreoffice-l10n-id libreoffice-l10n-in libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-kk libreoffice-l10n-km libreoffice-l10n-kmr libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mn libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-szl libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-za libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-librelogo libreoffice-math libreoffice-math-nogui libreoffice-nogui libreoffice-officebean libreoffice-plasma libreoffice-qt5 libreoffice-qt6 libreoffice-report-builder libreoffice-report-builder-bin libreoffice-report-builder-bin-nogui libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-script-provider-python libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb libreoffice-sdbc-mysql libreoffice-sdbc-postgresql libreoffice-smoketest-data libreoffice-style-breeze libreoffice-style-colibre libreoffice-style-elementary libreoffice-style-karasa-jaga libreoffice-style-sifr libreoffice-style-sukapura libreoffice-style-tango libreoffice-style-yaru libreoffice-subsequentcheckbase libreoffice-uiconfig-base libreoffice-uiconfig-calc libreoffice-uiconfig-common libreoffice-uiconfig-draw libreoffice-uiconfig-impress libreoffice-uiconfig-math libreoffice-uiconfig-report-builder libreoffice-uiconfig-writer libreoffice-writer libreoffice-writer-nogui libreofficekit-data libreofficekit-dev libridl-java libuno-cppu3t64 libuno-cppuhelpergcc3-3t64 libuno-purpenvhelpergcc3-3t64 libuno-sal3t64 libuno-salhelpergcc3-3t64 libunoil-java libunoloader-java python3-access2base python3-scriptforge python3-uno uno-libs-private ure ure-java libabsl-dev libabsl20220623t64 ruby-rack open-vm-tools open-vm-tools-containerinfo open-vm-tools-desktop open-vm-tools-dev open-vm-tools-salt-minion open-vm-tools-sdmp dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq5 postgresql-16 postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 postgresql-server-dev-16 0: 0: 0: 0: 0: 0: 0: libtomcat10-embed-java libtomcat10-java tomcat10 tomcat10-admin tomcat10-common tomcat10-docs tomcat10-examples tomcat10-user libtomcat9-java lemon libsqlite3-0 libsqlite3-dev libsqlite3-tcl sqlite3 sqlite3-doc sqlite3-tools gir1.2-girepository-3.0 gir1.2-girepository-3.0-dev gir1.2-glib-2.0 gir1.2-glib-2.0-dev libgirepository-2.0-0 libgirepository-2.0-dev libglib2.0-0t64 libglib2.0-bin libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libglib2.0-doc libglib2.0-tests intel-microcode cifs-utils net-tools net-tools ffmpeg ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra60 libavcodec60 libavdevice-dev libavdevice60 libavfilter-dev libavfilter-extra libavfilter-extra9 libavfilter9 libavformat-dev libavformat-extra libavformat-extra60 libavformat60 libavutil-dev libavutil58 libpostproc-dev libpostproc57 libswresample-dev libswresample4 libswscale-dev libswscale7 krb5-admin-server krb5-doc krb5-gss-samples krb5-k5tls krb5-kdc krb5-kdc-ldap krb5-kpropd krb5-locales krb5-multidev krb5-otp krb5-pkinit krb5-user libgssapi-krb5-2 libgssrpc4t64 libk5crypto3 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 libkrad-dev libkrad0 libkrb5-3 libkrb5-dev libkrb5support0 gir1.2-soup-2.4 libsoup-2.4-1 libsoup-gnome-2.4-1 libsoup-gnome2.4-dev libsoup2.4-common libsoup2.4-dev libsoup2.4-doc libsoup2.4-tests gir1.2-soup-3.0 libsoup-3.0-0 libsoup-3.0-common libsoup-3.0-dev libsoup-3.0-doc libsoup-3.0-tests python-setuptools-doc python3-pkg-resources python3-setuptools python3-setuptools-whl apport apport-core-dump-handler apport-gtk apport-kde apport-noui apport-retrace apport-valgrind dh-apport python3-apport python3-problem-report apport apport-core-dump-handler apport-gtk apport-kde apport-noui apport-retrace apport-valgrind dh-apport python3-apport python3-problem-report python-tornado-doc python3-tornado libmariadb-dev libmariadb-dev-compat libmariadb3 libmariadbd-dev libmariadbd19t64 mariadb-backup mariadb-client mariadb-client-core mariadb-common mariadb-plugin-connect mariadb-plugin-cracklib-password-check mariadb-plugin-gssapi-client mariadb-plugin-gssapi-server mariadb-plugin-hashicorp-key-management mariadb-plugin-mroonga mariadb-plugin-oqgraph mariadb-plugin-provider-bzip2 mariadb-plugin-provider-lz4 mariadb-plugin-provider-lzma mariadb-plugin-provider-lzo mariadb-plugin-provider-snappy mariadb-plugin-rocksdb mariadb-plugin-s3 mariadb-plugin-spider mariadb-server mariadb-server-10.5 mariadb-server-core mariadb-test mariadb-test-data php-twig php-twig-cache-extra php-twig-cssinliner-extra php-twig-doc php-twig-extra-bundle php-twig-html-extra php-twig-inky-extra php-twig-intl-extra php-twig-markdown-extra php-twig-string-extra libvpx-dev libvpx-doc libvpx9 vpx-tools python-django-doc python3-django fonts-glyphicons-halflings libjs-bootstrap libjs-bootstrap4 gir1.2-gst-plugins-bad-1.0 gstreamer1.0-opencv gstreamer1.0-plugins-bad gstreamer1.0-plugins-bad-apps libgstreamer-opencv1.0-0 libgstreamer-plugins-bad1.0-0 libgstreamer-plugins-bad1.0-dev libnss-myhostname libnss-mymachines libnss-resolve libnss-systemd libpam-systemd libsystemd-dev libsystemd-shared libsystemd0 libudev-dev libudev1 systemd systemd-boot systemd-boot-efi systemd-container systemd-coredump systemd-dev systemd-homed systemd-journal-remote systemd-oomd systemd-resolved systemd-standalone-sysusers systemd-standalone-tmpfiles systemd-sysv systemd-tests systemd-timesyncd systemd-ukify systemd-userdbd udev amd64-microcode libtomcat10-embed-java libtomcat10-java tomcat10 tomcat10-admin tomcat10-common tomcat10-docs tomcat10-examples tomcat10-user libtomcat9-java lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_oracle_(\d+)